Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Firefox (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Firefox (Aktualisierung)
ID: USN-3991-2
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, Ubuntu 19.04
Datum: Fr, 7. Juni 2019, 07:14
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.18.10.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11696
https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.18.04.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.16.04.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.19.04.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11697
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
Applikationen: Mozilla Firefox
Update von: Mehrere Probleme in Firefox

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1529267054317967259==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="M7NRf3iRP5Bdef2dVjCa2SOmBo18ddr9j"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--M7NRf3iRP5Bdef2dVjCa2SOmBo18ddr9j
Content-Type: multipart/mixed;
boundary="zXfFNke38jTfGEwYaQSyQnjkJU3gaUccT";
protected-headers="v1"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <ba2a32a1-5016-77a2-5f2c-3e1810c67c24@canonical.com>
Subject: [USN-3991-2] Firefox regression

--zXfFNke38jTfGEwYaQSyQnjkJU3gaUccT
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

==========================================================================
Ubuntu Security Notice USN-3991-2
June 06, 2019

firefox regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

USN-3991-1 caused a regression in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-3991-1 fixed vulnerabilities in Firefox. The update caused a
regression which resulted in issues when upgrading between Ubuntu
releases. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, spoof the browser
UI, trick the user in to launching local executable binaries, obtain
sensitive information, conduct cross-site scripting (XSS) attacks, or
execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693,
CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701,
CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819,
CVE-2019-9820, CVE-2019-9821)

It was discovered that pressing certain key combinations could bypass
addon installation prompt delays. If a user opened a specially crafted
website, an attacker could potentially exploit this to trick them in to
installing a malicious extension. (CVE-2019-11697)

It was discovered that history data could be exposed via drag and drop
of hyperlinks to and from bookmarks. If a user were tricked in to dragging
a specially crafted hyperlink to the bookmark toolbar or sidebar, and
subsequently back in to the web content area, an attacker could
potentially exploit this to obtain sensitive information. (CVE-2019-11698)

A type confusion bug was discovered with object groups and UnboxedObjects.
If a user were tricked in to opening a specially crafted website after
enabling the UnboxedObjects feature, an attacker could potentially
exploit this to bypass security checks. (CVE-2019-9816)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
firefox 67.0.1+build1-0ubuntu0.19.04.1

Ubuntu 18.10:
firefox 67.0.1+build1-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
firefox 67.0.1+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
firefox 67.0.1+build1-0ubuntu0.16.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/3991-2
https://usn.ubuntu.com/3991-1
https://launchpad.net/bugs/1830096

Package Information:

https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.19.04.1

https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.18.10.1

https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.18.04.1

https://launchpad.net/ubuntu/+source/firefox/67.0.1+build1-0ubuntu0.16.04.1


--zXfFNke38jTfGEwYaQSyQnjkJU3gaUccT--

--M7NRf3iRP5Bdef2dVjCa2SOmBo18ddr9j
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlz5l0cACgkQYR+97NWU
bg91FAf+KarYuTFlzpHFGwiBMpdmlJjokHVuoHCPqpIE/vHtn9JgrB3j0Wxc8g+9
ATGFrE5Z+o+9pQi2BqGsCpfZ8O5rOpQtcxff08hLDQ2GVrvO+qSWuuqHi7eZgt6k
ZU8GYq/eAd+vdV9zCZ7Mi4jwXrhyPiIa5wAzSycAgSqSlLNlY0mgs2muz3wSbjtj
vJGeqBirFoIog5yEBKfkbwcnf49n+Ihn0GweSYBFyhSRgCa5SsmDDh56hfgyHi9r
TOYs2hsKdJmpNF4VoDQkqIjiInkeBHxc4iss6oymXz26eNr39dVIPlzualIp6a96
zRj2oFfT8rA30DwSKHipa9H0SeIPnA==
=QjjZ
-----END PGP SIGNATURE-----

--M7NRf3iRP5Bdef2dVjCa2SOmBo18ddr9j--


--===============1529267054317967259==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============1529267054317967259==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung