This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6644231823899405360== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="H7b2bk1t9Qc4rk1gIVkcPnKjRMESWjbVK"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --H7b2bk1t9Qc4rk1gIVkcPnKjRMESWjbVK Content-Type: multipart/mixed; boundary="JvqLFJFnqcEBIk5rLibWJdHfn7n9taH5g"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <21f4d349-7dd6-cf3c-7e98-c47565a19389@canonical.com> Subject: [USN-3391-2] Ubufox update
--JvqLFJFnqcEBIk5rLibWJdHfn7n9taH5g Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3391-2 August 16, 2017
ubufox update ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 17.04 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
This update provides compatible packages for Firefox 55.
Software Description: - ubufox: Ubuntu Firefox specific configuration defaults and apt support
Details:
USN-3391-1 fixed vulnerabilities in Firefox. This update provides the corresponding update for Ubufox.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to conduct cross-site scripting (XSS) attacks, bypass sandbox restrictions, obtain sensitive information, spoof the origin of modal alerts, bypass same origin restrictions, read uninitialized memory, cause a denial of service via program crash or hang, or execute arbitrary code. (CVE-2017-7753, CVE-2017-7779, CVE-2017-7780, CVE-2017-7781, CVE-2017-7783, CVE-2017-7784, CVE-2017-7785, CVE-2017-7786, CVE-2017-7787, CVE-2017-7788, CVE-2017-7789, CVE-2017-7791, CVE-2017-7792, CVE-2017-7794, CVE-2017-7797, CVE-2017-7798, CVE-2017-7799, CVE-2017-7800, CVE-2017-7801, CVE-2017-7802, CVE-2017-7803, CVE-2017-7806, CVE-2017-7807, CVE-2017-7808, CVE-2017-7809)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.04: xul-ext-ubufox 3.4-0ubuntu0.17.04.1
Ubuntu 16.04 LTS: xul-ext-ubufox 3.4-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: xul-ext-ubufox 3.4-0ubuntu0.14.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://www.ubuntu.com/usn/usn-3391-2 https://www.ubuntu.com/usn/usn-3391-1 https://launchpad.net/bugs/1711137
Package Information: https://launchpad.net/ubuntu/+source/ubufox/3.4-0ubuntu0.17.04.1 https://launchpad.net/ubuntu/+source/ubufox/3.4-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/ubufox/3.4-0ubuntu0.14.04.1
--JvqLFJFnqcEBIk5rLibWJdHfn7n9taH5g--
--H7b2bk1t9Qc4rk1gIVkcPnKjRMESWjbVK Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJZlFWBAAoJEGEfvezVlG4PNL4IAIllnc45O7IwxZMIHTixO+dq q5Il5o2rlCLmfufUhw1nYugIkamR+fRXcc7f4xSelrrUKQvHKpWyA3Otls2YuDtN 826K0sUneW6xi1GfwG0m0ChUByoT27oGoEOSAICXfQm7L3zdfia/OmH1LQU+985b p76zjHG+cb5XWZX3By/9AnvgJ33/E/igdkIhVbF4yIl8pho5h1Al4nNbVZFWfWj4 Te5V/ncS6HNsg2+z/lAuS//4hSFkULJ0aEdLB5uAQVaeE2gLHlS+O8uv9u5fvmlS SJXpfRAtBS4H4uiO7u29nmMnM8Ts+ZSPaus2eURKWSNULWPbI1MXsGk5/0C138w= =Klvr -----END PGP SIGNATURE-----
--H7b2bk1t9Qc4rk1gIVkcPnKjRMESWjbVK--
--===============6644231823899405360== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline
-- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
--===============6644231823899405360==--
|