This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============6164437547188433698== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP Content-Type: multipart/mixed; boundary="NS1i8CEPaEvMGqec85awsrf6EHKl24sp4"; protected-headers="v1" From: Chris Coulson <chris.coulson@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <6b76f32b-d0ca-3683-da18-9d0d53ba3663@canonical.com> Subject: [USN-3991-3] Firefox regression
--NS1i8CEPaEvMGqec85awsrf6EHKl24sp4 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable Content-Language: en-US
========================================================================== Ubuntu Security Notice USN-3991-3 June 14, 2019
firefox regression ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 19.04 - Ubuntu 18.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
USN-3991-2 caused a regression in Firefox
Software Description: - firefox: Mozilla Open Source web browser
Details:
USN-3991-1 fixed vulnerabilities in Firefox, and USN-3991-2 fixed a subsequent regression. The update caused an additional regression that resulted in Firefox failing to load correctly after executing it in safe mode. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, trick the user in to launching local executable binaries, obtain sensitive information, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693, CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701, CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819, CVE-2019-9820, CVE-2019-9821) It was discovered that pressing certain key combinations could bypass addon installation prompt delays. If a user opened a specially crafted website, an attacker could potentially exploit this to trick them in to installing a malicious extension. (CVE-2019-11697) It was discovered that history data could be exposed via drag and drop of hyperlinks to and from bookmarks. If a user were tricked in to dragging a specially crafted hyperlink to the bookmark toolbar or sidebar, and subsequently back in to the web content area, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11698) A type confusion bug was discovered with object groups and UnboxedObjects. If a user were tricked in to opening a specially crafted website after enabling the UnboxedObjects feature, an attacker could potentially exploit this to bypass security checks. (CVE-2019-9816)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 19.04: firefox 67.0.2+build2-0ubuntu0.19.04.1
Ubuntu 18.10: firefox 67.0.2+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS: firefox 67.0.2+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS: firefox 67.0.2+build2-0ubuntu0.16.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://usn.ubuntu.com/3991-3 https://usn.ubuntu.com/3991-1 https://launchpad.net/bugs/1832907
Package Information: https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.19.04.1 https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.10.1 https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.16.04.1
--NS1i8CEPaEvMGqec85awsrf6EHKl24sp4--
--O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl0EBs8ACgkQYR+97NWU bg8mtgf/XdST+iqHe0e9uzwHZG4RV7AuTpltb39M3IFJ1qkRmsXjom9cRAiTSQRh 2tqUIA3YXmTFbypo/MO0yzpqpk/Il6GCDSKXwzOKNZueUNiQkzyScEcMM6wWYX1m FdErD9tSyCNdDktkwqX2nuhtlPt/whPzbrUzHht8wsFhEOdNC/jwn3xbMkb4C92h b1AO+HolMo3WbmFEYo77cWBgfBIGbUudMuBUmV8dsFMmweVPnhgpfH+UrOWNPphn cf7ABt+nfNL0R8cohRYh3Px7KmlgSNmgHZY+bQI91hZpiuF/zoMY/mVwBoi8kerf cBqAcrJYNiaqG14rIzOgeyRwW2Ur3g== =ouJY -----END PGP SIGNATURE-----
--O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP--
--===============6164437547188433698== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============6164437547188433698==--
|