This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4261450477538590319== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="NDm5ROKE17UxJdhoOWBAa5rIfbAEPjLMs"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --NDm5ROKE17UxJdhoOWBAa5rIfbAEPjLMs Content-Type: multipart/mixed; boundary="kEmWrkee4w2SPKsIJpjXleWtLWrn5PxCF" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <419c4f79-9c94-08c6-8ec9-e6059f7e81ba@canonical.com> Subject: [USN-3216-1] Firefox vulnerabilities
--kEmWrkee4w2SPKsIJpjXleWtLWrn5PxCF Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3216-1 March 07, 2017
firefox vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Software Description: - firefox: Mozilla Open Source web browser
Details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass same origin restrictions, obtain sensitive information, spoof the addressbar, spoof the print dialog, cause a denial of service via application crash or hang, or execute arbitrary code. (CVE-2017-5398, CVE-2017-5399, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5403, CVE-2017-5404, CVE-2017-5405, CVE-2017-5406, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5412, CVE-2017-5413, CVE-2017-5414, CVE-2017-5415, CVE-2017-5416, CVE-2017-5417, CVE-2017-5418, CVE-2017-5419, CVE-2017-5420, CVE-2017-5421, CVE-2017-5422, CVE-2017-5426, CVE-2017-5427)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: firefox 52.0+build2-0ubuntu0.16.10.1
Ubuntu 16.04 LTS: firefox 52.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: firefox 52.0+build2-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: firefox 52.0+build2-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3216-1 CVE-2016-5412, CVE-2017-5398, CVE-2017-5399, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5403, CVE-2017-5404, CVE-2017-5405, CVE-2017-5406, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5413, CVE-2017-5414, CVE-2017-5415, CVE-2017-5416, CVE-2017-5417, CVE-2017-5418, CVE-2017-5419, CVE-2017-5420, CVE-2017-5421, CVE-2017-5422, CVE-2017-5426, CVE-2017-5427
Package Information: https://launchpad.net/ubuntu/+source/firefox/52.0+build2-0ubuntu0.16.10.1 https://launchpad.net/ubuntu/+source/firefox/52.0+build2-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/firefox/52.0+build2-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/firefox/52.0+build2-0ubuntu0.12.04.1
--kEmWrkee4w2SPKsIJpjXleWtLWrn5PxCF--
--NDm5ROKE17UxJdhoOWBAa5rIfbAEPjLMs Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQEcBAEBCAAGBQJYv0tMAAoJEGEfvezVlG4Py4YH/j7tYDhMkD1NY5QlAQBxUhZS TJi0QQiyci3/I/fCsxWVFBqvQGAYwPvUoIluOEDeoZk/DBa37PgoFXD+aLJKq2ak /79/+C93c2caoes+Xa0xi2wh/cSLe0xzbwTE5B0pRKkg9XMTet9Pn+krS4ErQLVB VkY7JoAAWBdmXKKzuWl9huixIlQFOncoBRlLa0LXRN7wrPE7/vE7u0kKd1Nff4XP Om+rQCXz6CWY+lj2+D76wMToV/yjlmlpzd5A/6z0NblTKpkYgaH6DgH52gwC+0Da +nevBvd1S63LoRpjUovhTEPF/crwP+qis7QA2+cygQt9c+RBH3WI4AqGkSvAh9k= =LGY2 -----END PGP SIGNATURE-----
--NDm5ROKE17UxJdhoOWBAa5rIfbAEPjLMs--
--===============4261450477538590319== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============4261450477538590319==--
|