This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============5671388582236643518== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="sSsgNfGaqGAALoxZOhXrVjBt3TU0Ulaq4"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --sSsgNfGaqGAALoxZOhXrVjBt3TU0Ulaq4 Content-Type: multipart/mixed; boundary="9JHUU1rshY5XJ5ix1G0ZpBPOsfsXWd5nV"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <1d4f0793-303b-70c9-742c-011f263ca782@canonical.com> Subject: [USN-3705-2] Firefox regressions
--9JHUU1rshY5XJ5ix1G0ZpBPOsfsXWd5nV Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3705-2 July 10, 2018
firefox regressions ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.04 LTS - Ubuntu 17.10 - Ubuntu 16.04 LTS - Ubuntu 14.04 LTS
Summary:
USN-3705-1 caused some minor regressions in Firefox.
Software Description: - firefox: Mozilla Open Source web browser
Details:
USN-3705-1 fixed vulnerabilities in Firefox. The update introduced various minor regressions. This update fixes the problems.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, read uninitialized memory, bypass same-origin restrictions, bypass CORS restrictions, bypass CSRF protections, obtain sensitive information, or execute arbitrary code. (CVE-2018-5156, CVE-2018-5186, CVE-2018-5187, CVE-2018-5188, CVE-2018-12358, CVE-2018-12359, CVE-2018-12360, CVE-2018-12361, CVE-2018-12362, CVE-2018-12363, CVE-2018-12364, CVE-2018-12365, CVE-2018-12366, CVE-2018-12367, CVE-2018-12370, CVE-2018-12371) A security issue was discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit this to obtain full browser permissions. (CVE-2018-12369)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04 LTS: firefox 61.0.1+build1-0ubuntu0.18.04.1
Ubuntu 17.10: firefox 61.0.1+build1-0ubuntu0.17.10.1
Ubuntu 16.04 LTS: firefox 61.0.1+build1-0ubuntu0.16.04.1
Ubuntu 14.04 LTS: firefox 61.0.1+build1-0ubuntu0.14.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://usn.ubuntu.com/usn/usn-3705-2 https://usn.ubuntu.com/usn/usn-3705-1 https://launchpad.net/bugs/1781009
Package Information: https://launchpad.net/ubuntu/+source/firefox/61.0.1+build1-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/firefox/61.0.1+build1-0ubuntu0.17.10.1 https://launchpad.net/ubuntu/+source/firefox/61.0.1+build1-0ubuntu0.16.04.1 https://launchpad.net/ubuntu/+source/firefox/61.0.1+build1-0ubuntu0.14.04.1
--9JHUU1rshY5XJ5ix1G0ZpBPOsfsXWd5nV--
--sSsgNfGaqGAALoxZOhXrVjBt3TU0Ulaq4 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAltE3OYACgkQYR+97NWU bg9loQf9Hjxy0j9r5fHUE16Jquye3Bu+MYuUGiW7Qlgndl00HQEZJUVEXiXnZh/z 2RcJYsEtyM6AFhgMTNLWDp54xF4Xvjx28Ki8O0cRzpJT5Ocb+mp4LXbXx6Z9Dx7q rKd8PL7SrH/DQdtEJeBeH5+oscs6fGcQZJgz6egVbE6NQQXlNclKaWkgMcq2IrkJ +pHyWxg/EAksb9IeiWNRZworwO7g6y/CZLbWC6ZBMVQ7vMB49i6MX/Sa9XyqzLCR xLqpjtyEHiB6jtYK2MsldknqbM595+84RBJpuRvbax8UwtAU7hGAERSXloI6pAH6 abFnZWwHKC4Q/gJVKyzQQwD5pr+69g== =U7th -----END PGP SIGNATURE-----
--sSsgNfGaqGAALoxZOhXrVjBt3TU0Ulaq4--
--===============5671388582236643518== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============5671388582236643518==--
|