This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============7157365872079026966== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="p9pJTGk90b8T8SFbULvjO6pClassfuarS"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --p9pJTGk90b8T8SFbULvjO6pClassfuarS Content-Type: multipart/mixed; boundary="KpXVvSJv5HP8oDA9vRPAdiRPV7XDNpkSH"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <760b0da9-517a-5cb9-034e-f443fb573792@canonical.com> Subject: [USN-3477-2] Firefox regression
--KpXVvSJv5HP8oDA9vRPAdiRPV7XDNpkSH Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3477-2 November 27, 2017
firefox regression ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.10 - Ubuntu 17.04 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
USN-3477-1 caused a regression in Firefox.
Software Description: - firefox: Mozilla Open Source web browser
Details:
USN-3477-1 fixed vulnerabilities in Firefox. The update caused search suggestions to not be displayed when performing Google searches from the search bar. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, obtain sensitive information, bypass same-origin restrictions, bypass CSP protections, bypass mixed content blocking, spoof the addressbar, or execute arbitrary code. (CVE-2017-7826, CVE-2017-7827, CVE-2017-7828, CVE-2017-7830, CVE-2017-7831, CVE-2017-7832, CVE-2017-7833, CVE-2017-7834, CVE-2017-7835, CVE-2017-7837, CVE-2017-7838, CVE-2017-7842) It was discovered that javascript: URLs pasted in to the addressbar would be executed instead of being blocked in some circumstances. If a user were tricked in to copying a specially crafted URL in to the addressbar, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2017-7839) It was discovered that exported bookmarks do not strip script elements from user-supplied tags. If a user were tricked in to adding specially crafted tags to bookmarks, exporting them and then opening the resulting HTML file, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2017-7840)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.10: firefox 57.0+build4-0ubuntu0.17.10.6
Ubuntu 17.04: firefox 57.0+build4-0ubuntu0.17.04.6
Ubuntu 16.04 LTS: firefox 57.0+build4-0ubuntu0.16.04.6
Ubuntu 14.04 LTS: firefox 57.0+build4-0ubuntu0.14.04.5
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://www.ubuntu.com/usn/usn-3477-2 https://www.ubuntu.com/usn/usn-3477-1 https://launchpad.net/bugs/1733970
Package Information: https://launchpad.net/ubuntu/+source/firefox/57.0+build4-0ubuntu0.17.10.6 https://launchpad.net/ubuntu/+source/firefox/57.0+build4-0ubuntu0.17.04.6 https://launchpad.net/ubuntu/+source/firefox/57.0+build4-0ubuntu0.16.04.6 https://launchpad.net/ubuntu/+source/firefox/57.0+build4-0ubuntu0.14.04.5
--KpXVvSJv5HP8oDA9vRPAdiRPV7XDNpkSH--
--p9pJTGk90b8T8SFbULvjO6pClassfuarS Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJaHJTDAAoJEGEfvezVlG4POo0IALD/0ekgCIadlYbozGUMzI3J fr2I4at7R8nuZorpqvMbae23qvzRNQDIHcia6L8ldk0mLL+ZXMPco3GKxUpWVMoR DwjC24jP3zxVu4D4RpM0HFvB9/8KcRmDYCZmy4Nal8BJLeo647JjApgyL2sRJWPe ut/BAnoHP1Guna6pW1h4Y5vZ/mvTGtvvD3iAJjWRuDsIOHrECY9w44fWWm8CY4Pc l6bxpQupTV6bI+2iEbEfqiken+ySvoTcLaftBnDAQMHXPPT2VNB0cGiIONFdG6Fo G1mCigqXyFYDXBfkr9KavR2jzuG4E+3HUbmrUOkIOHfHcfYC5uEaImDwwYmEpRw= =DOQ6 -----END PGP SIGNATURE-----
--p9pJTGk90b8T8SFbULvjO6pClassfuarS--
--===============7157365872079026966== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============7157365872079026966==--
|