Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Ubufox (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Ubufox (Aktualisierung)
ID: USN-2743-2
Distribution: Ubuntu
Plattformen: Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 15.04
Datum: Mi, 23. September 2015, 10:31
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4501
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7177
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4500
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4517
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7175
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7176
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4508
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4512
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4502
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4504
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4519
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4506
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4516
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4509
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7180
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4520
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4510
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4507
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7174
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4521
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-4522
Applikationen: Ubufox
Update von: Mehrere Probleme in Mozilla Firefox

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============8965878502231077675==
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve
Content-Type: text/plain; charset=windows-125
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-2743-2
September 22, 2015

ubufox update
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS

Summary:

This update provides compatible packages for Firefox 41

Software Description:
- ubufox: Ubuntu Firefox specific configuration defaults and apt support

Details:

USN-2743-1 fixed vulnerabilities in Firefox. This update provides the
corresponding update for Ubufox.

Original advisory details:

Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David
Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup
discovered multiple memory safety issues in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-4500, CVE-2015-4501)

André Bargull discovered that when a web page creates a scripted proxy
for the window with a handler defined a certain way, a reference to the
inner window will be passed, rather than that of the outer window.
(CVE-2015-4502)

Felix Gröbert discovered an out-of-bounds read in the QCMS color
management library in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or obtain
sensitive information. (CVE-2015-4504)

Khalil Zhani discovered a buffer overflow when parsing VP9 content in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-4506)

Spandan Veggalam discovered a crash while using the debugger API in some
circumstances. If a user were tricked in to opening a specially crafted
website whilst using the debugger, an attacker could potentially exploit
this to execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-4507)

Juho Nurminen discovered that the URL bar could display the wrong URL in
reader mode in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
conduct URL spoofing attacks. (CVE-2015-4508)

A use-after-free was discovered when manipulating HTML media content in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-4509)

Looben Yang discovered a use-after-free when using a shared worker with
IndexedDB in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
cause a denial of service via application crash, or execute arbitrary code
with the privileges of the user invoking Firefox. (CVE-2015-4510)

Francisco Alonso discovered an out-of-bounds read during 2D canvas
rendering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
obtain sensitive information. (CVE-2015-4512)

Jeff Walden discovered that changes could be made to immutable properties
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to execute
arbitrary script in a privileged scope. (CVE-2015-4516)

Ronald Crane reported multiple vulnerabilities. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit these to cause a denial of service via application crash, or
execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174,
CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)

Mario Gomes discovered that dragging and dropping an image after a
redirect exposes the redirected URL to scripts. An attacker could
potentially exploit this to obtain sensitive information. (CVE-2015-4519)

Ehsan Akhgari discovered 2 issues with CORS preflight requests. An
attacker could potentially exploit these to bypass CORS restrictions.
(CVE-2015-4520)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
xul-ext-ubufox 3.2-0ubuntu0.15.04.1

Ubuntu 14.04 LTS:
xul-ext-ubufox 3.2-0ubuntu0.14.04.1

Ubuntu 12.04 LTS:
xul-ext-ubufox 3.2-0ubuntu0.12.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2743-2
http://www.ubuntu.com/usn/usn-2743-1
https://launchpad.net/bugs/1498681

Package Information:
https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.15.04.1
https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.14.04.1
https://launchpad.net/ubuntu/+source/ubufox/3.2-0ubuntu0.12.04.1



--LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v2

iQEcBAEBCAAGBQJWAdU6AAoJEGEfvezVlG4PISoH/jyBVQUhi/qSFGKZZwMmATpo
+nF/AlieIXX8qiIqMfexPxx+r+QvRdQxoGyxHkx/W7UrW0EGxplQgrfHUpUROtcM
EHmDp8T3tavIgEY1a5ixXy5wdVBRmnwofBETzzRIxQry2c0L6mfG/iTPsrCz0hh2
mGvQwEOMAg7TxLaDqtMrS55mLVxyYm7dcc6SsKx3KfRCJE82leY8GTEOoOgpMHAa
Vi/PNT5YhzYEd3Is1ODnmUlbwLDEXUWTUB8dYHY7+V23+Rk36EGpzti8LCh0wTcA
jlHkjWR1MxwJn121KjHwM367InC0o2inffzgrBm/2yWmiLlMntNoHEfNMsUoZ24=
=CIUl
-----END PGP SIGNATURE-----

--LMnppi4M9Geo2omgdL8Mdoi5nLW0JPMve--


--===============8965878502231077675==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============8965878502231077675==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung