This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1514324013457353982== Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="wwC7V178SYQwmexgPfbkE5xKRpEVw0G3p"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --wwC7V178SYQwmexgPfbkE5xKRpEVw0G3p Content-Type: multipart/mixed; boundary="jlf1n1UEAMXuP1EMAbgdxoB86oB8avGU1"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <f1a66b9c-249e-4dd6-e3ed-99893277b7f2@canonical.com> Subject: [USN-3645-2] Firefox regression
--jlf1n1UEAMXuP1EMAbgdxoB86oB8avGU1 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3645-2 May 18, 2018
firefox regression ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
USN-3645-1 caused a regression in Firefox.
Software Description: - firefox: Mozilla Open Source web browser
Details:
USN-3645-1 fixed vulnerabilities in Firefox. The update caused an issue where users experienced long UI pauses in some circumsances. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, bypass same-origin restrictions, conduct cross-site scripting (XSS) attacks, install lightweight themes without user interaction, spoof the filename in the downloads panel, or execute arbitrary code. (CVE-2018-5150, CVE-2018-5151, CVE-2018-5153, CVE-2018-5154, CVE-2018-5155, CVE-2018-5157, CVE-2018-5158, CVE-2018-5159, CVE-2018-5160, CVE-2018-5163, CVE-2018-5164, CVE-2018-5168, CVE-2018-5173, CVE-2018-5175, CVE-2018-5177, CVE-2018-5180) Multiple security issues were discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit these to obtain sensitive information, or bypass security restrictions. (CVE-2018-5152, CVE-2018-5166) It was discovered that the web console and JavaScript debugger incorrectly linkified chrome: and javascript URLs. If a user were tricked in to clicking a specially crafted link, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5167) It was discovered that dragging and dropping link text on to the home button could set the home page to include chrome pages. If a user were tricked in to dragging and dropping a specially crafted link on to the home button, an attacker could potentially exploit this bypass security restrictions. (CVE-2018-5169) It was discovered that the Live Bookmarks page and PDF viewer would run script pasted from the clipboard. If a user were tricked in to copying and pasting specially crafted text, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5172) It was discovered that the JSON viewer incorrectly linkified javascript: URLs. If a user were tricked in to clicking on a specially crafted link, an attacker could potentially exploit this to obtain sensitive information. (CVE-2018-5176) It was discovered that dragging a file: URL on to a tab that is running in a different process would cause the file to open in that process. If a user were tricked in to dragging a file: URL, an attacker could potentially exploit this to bypass intended security policies. (CVE-2018-5181) It was discovered that dragging text that is a file: URL on to the addressbar would open the specified file. If a user were tricked in to dragging specially crafted text on to the addressbar, an attacker could potentially exploit this to bypass intended security policies. (CVE-2018-5182)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: firefox 60.0.1+build2-0ubuntu0.18.04.1
Ubuntu 17.10: firefox 60.0.1+build2-0ubuntu0.17.10.1
Ubuntu 16.04 LTS: firefox 60.0.1+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: firefox 60.0.1+build2-0ubuntu0.14.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3645-2 https://usn.ubuntu.com/usn/usn-3645-1 https://launchpad.net/bugs/1772115
Package Information: https://launchpad.net/ubuntu/+source/firefox/60.0.1+build2-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/firefox/60.0.1+build2-0ubuntu0.17.10.1 https://launchpad.net/ubuntu/+source/firefox/60.0.1+build2-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/firefox/60.0.1+build2-0ubuntu0.14.04.1
--jlf1n1UEAMXuP1EMAbgdxoB86oB8avGU1--
--wwC7V178SYQwmexgPfbkE5xKRpEVw0G3p Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJa/0MQAAoJEGEfvezVlG4Pt44IAKiTS+fQDukXmUrXE+u3tBiJ 8K2vD7eVVzsAf3fDlMwYJpgsMkh9bBJnT/UAQPg1vMsHo5DWjYGUJHHo7SRA5Wvj NOTtwumFW7XDToewsxen2BNDT0TOCXuE8MNalKip4kOCIDN6zgxCYPDMnLz79PBu 3cy/2oNixJfuy50Jq/b+MDxffLanmzicL4kUI62jlfHkls/X1wsqfd1fK2wVWOzB kMOSBJ45wRoq9lmxV/OJjZ3saCGLX2a0bgSdKToblJ5weHuMS0HzldChY9N8HQTt S4vo9fxwm3gXIr37WOCEvqZ5RwMbAHtdrRFKlp8EFxbFESRGMm6AomyeBTjfMrE= =G97J -----END PGP SIGNATURE-----
--wwC7V178SYQwmexgPfbkE5xKRpEVw0G3p--
--===============1514324013457353982== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============1514324013457353982==--
|