This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0397843601939320511== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="SatglHtBWjam64SQijVJk3IrVoGuMUpHs"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --SatglHtBWjam64SQijVJk3IrVoGuMUpHs Content-Type: multipart/mixed; boundary="kkm6hAuteJeLTeQgaTtTta1n8H8R5IGm0" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <99edde8b-ae54-7ae9-69be-fa93a42ff908@canonical.com> Subject: [USN-3216-2] Firefox regression
--kkm6hAuteJeLTeQgaTtTta1n8H8R5IGm0 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3216-2 March 30, 2017
firefox regression ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS
Summary:
USN-3216-1 introduced a regression in Firefox.
Software Description: - firefox: Mozilla Open Source web browser
Details:
USN-3216-1 fixed vulnerabilities in Firefox. The update resulted in a startup crash when Firefox is used with XRDP. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to bypass same origin restrictions, obtain sensitive information, spoof the addressbar, spoof the print dialog, cause a denial of service via application crash or hang, or execute arbitrary code. (CVE-2017-5398, CVE-2017-5399, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5403, CVE-2017-5404, CVE-2017-5405, CVE-2017-5406, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410, CVE-2017-5412, CVE-2017-5413, CVE-2017-5414, CVE-2017-5415, CVE-2017-5416, CVE-2017-5417, CVE-2017-5418, CVE-2017-5419, CVE-2017-5420, CVE-2017-5421, CVE-2017-5422, CVE-2017-5426, CVE-2017-5427)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10: firefox 52.0.2+build1-0ubuntu0.16.10.1
Ubuntu 16.04 LTS: firefox 52.0.2+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: firefox 52.0.2+build1-0ubuntu0.14.04.1
Ubuntu 12.04 LTS: firefox 52.0.2+build1-0ubuntu0.12.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: http://www.ubuntu.com/usn/usn-3216-2 http://www.ubuntu.com/usn/usn-3216-1 https://launchpad.net/bugs/1671079
Package Information: https://launchpad.net/ubuntu/+source/firefox/52.0.2+build1-0ubuntu0.16.10.1 https://launchpad.net/ubuntu/+source/firefox/52.0.2+build1-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/firefox/52.0.2+build1-0ubuntu0.14.04.1 https://launchpad.net/ubuntu/+source/firefox/52.0.2+build1-0ubuntu0.12.04.1
--kkm6hAuteJeLTeQgaTtTta1n8H8R5IGm0--
--SatglHtBWjam64SQijVJk3IrVoGuMUpHs Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE----- Version: GnuPG v2
iQEcBAEBCAAGBQJY3YFRAAoJEGEfvezVlG4PY+AH/AysypB/Cr7KtmJR54979TP6 oStwhro/MYy3/G0iQIEWtkSvoBosmx9dlDSsZWEQTPkt7pJMcxdTd7koUSylvVSa chFLaVLhHiQIMTwFivzoBSdESN0r9r49Y7KZWf5BXpH5bUoLSVIR+JbS3fpdEtsh 87AylRW0VKuh68x5W5s6O8ZpyhbRkzpJDtsUkWuYiSQiaj+W55Noax6jZ0gER64V JXEFV3JLNt8Yemi0wk6n776REFyLGCcB4mfup87GbiiFplXXmTryGEbObsUkdp1o hUZo8BrKoB5f2dN6eICChwU4KL1LJRPdLogYIxaln45V1BUzfPLuap+VbBNxcCM= =gLEP -----END PGP SIGNATURE-----
--SatglHtBWjam64SQijVJk3IrVoGuMUpHs--
--===============0397843601939320511== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============0397843601939320511==--
|