This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============8965878502231077675== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve Content-Type: text/plain; charset=windows-125 Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-2743-2 September 22, 2015
ubufox update ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
This update provides compatible packages for Firefox 41
Software Description: - ubufox: Ubuntu Firefox specific configuration defaults and apt support
Details:
USN-2743-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubufox.
Original advisory details:
Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup discovered multiple memory safety issues in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4500, CVE-2015-4501) André Bargull discovered that when a web page creates a scripted proxy for the window with a handler defined a certain way, a reference to the inner window will be passed, rather than that of the outer window. (CVE-2015-4502) Felix Gröbert discovered an out-of-bounds read in the QCMS color management library in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or obtain sensitive information. (CVE-2015-4504) Khalil Zhani discovered a buffer overflow when parsing VP9 content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4506) Spandan Veggalam discovered a crash while using the debugger API in some circumstances. If a user were tricked in to opening a specially crafted website whilst using the debugger, an attacker could potentially exploit this to execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4507) Juho Nurminen discovered that the URL bar could display the wrong URL in reader mode in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to conduct URL spoofing attacks. (CVE-2015-4508) A use-after-free was discovered when manipulating HTML media content in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4509) Looben Yang discovered a use-after-free when using a shared worker with IndexedDB in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4510) Francisco Alonso discovered an out-of-bounds read during 2D canvas rendering in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4512) Jeff Walden discovered that changes could be made to immutable properties in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to execute arbitrary script in a privileged scope. (CVE-2015-4516) Ronald Crane reported multiple vulnerabilities. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174, CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180) Mario Gomes discovered that dragging and dropping an image after a redirect exposes the redirected URL to scripts. An attacker could potentially exploit this to obtain sensitive information. (CVE-2015-4519) Ehsan Akhgari discovered 2 issues with CORS preflight requests. An attacker could potentially exploit these to bypass CORS restrictions. (CVE-2015-4520)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 15.04: xul-ext-ubufox 3.2-0ubuntu0.15.04.1
Ubuntu 14.04 LTS: xul-ext-ubufox 3.2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: xul-ext-ubufox 3.2-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-2743-2 http://www.ubuntu.com/usn/usn-2743-1 https://launchpad.net/bugs/1498681
Package Information: https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.15.04.1 https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.12.04.1
--LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQEcBAEBCAAGBQJWAdU6AAoJEGEfvezVlG4PISoH/jyBVQUhi/qSFGKZZwMmATpo +nF/AlieIXX8qiIqMfexPxx+r+QvRdQxoGyxHkx/W7UrW0EGxplQgrfHUpUROtcM EHmDp8T3tavIgEY1a5ixXy5wdVBRmnwofBETzzRIxQry2c0L6mfG/iTPsrCz0hh2 mGvQwEOMAg7TxLaDqtMrS55mLVxyYm7dcc6SsKx3KfRCJE82leY8GTEOoOgpMHAa Vi/PNT5YhzYEd3Is1ODnmUlbwLDEXUWTUB8dYHY7+V23+Rk36EGpzti8LCh0wTcA jlHkjWR1MxwJn121KjHwM367InC0o2inffzgrBm/2yWmiLlMntNoHEfNMsUoZ24= =CIUl -----END PGP SIGNATURE-----
--LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve--
--===============8965878502231077675== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============8965878502231077675==--
|