Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in Firefox (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in Firefox (Aktualisierung)
ID: USN-3991-3
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, Ubuntu 19.04
Datum: Sa, 15. Juni 2019, 00:34
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11692
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9817
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9821
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9819
https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.10.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9820
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11696
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11693
https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.16.04.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7317
https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.04.1
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11699
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11695
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11701
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9800
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11698
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11691
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11697
https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.19.04.1
Applikationen: Mozilla Firefox
Update von: Mehrere Probleme in Firefox

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============6164437547188433698==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP
Content-Type: multipart/mixed;
boundary="NS1i8CEPaEvMGqec85awsrf6EHKl24sp4";
protected-headers="v1"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <6b76f32b-d0ca-3683-da18-9d0d53ba3663@canonical.com>
Subject: [USN-3991-3] Firefox regression

--NS1i8CEPaEvMGqec85awsrf6EHKl24sp4
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

==========================================================================
Ubuntu Security Notice USN-3991-3
June 14, 2019

firefox regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

USN-3991-2 caused a regression in Firefox

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-3991-1 fixed vulnerabilities in Firefox, and USN-3991-2 fixed a
subsequent regression. The update caused an additional regression that
resulted in Firefox failing to load correctly after executing it in safe
mode. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, spoof the browser
UI, trick the user in to launching local executable binaries, obtain
sensitive information, conduct cross-site scripting (XSS) attacks, or
execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693,
CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701,
CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819,
CVE-2019-9820, CVE-2019-9821)

It was discovered that pressing certain key combinations could bypass
addon installation prompt delays. If a user opened a specially crafted
website, an attacker could potentially exploit this to trick them in to
installing a malicious extension. (CVE-2019-11697)

It was discovered that history data could be exposed via drag and drop
of hyperlinks to and from bookmarks. If a user were tricked in to dragging
a specially crafted hyperlink to the bookmark toolbar or sidebar, and
subsequently back in to the web content area, an attacker could
potentially exploit this to obtain sensitive information. (CVE-2019-11698)

A type confusion bug was discovered with object groups and UnboxedObjects.
If a user were tricked in to opening a specially crafted website after
enabling the UnboxedObjects feature, an attacker could potentially
exploit this to bypass security checks. (CVE-2019-9816)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
firefox 67.0.2+build2-0ubuntu0.19.04.1

Ubuntu 18.10:
firefox 67.0.2+build2-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
firefox 67.0.2+build2-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
firefox 67.0.2+build2-0ubuntu0.16.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/3991-3
https://usn.ubuntu.com/3991-1
https://launchpad.net/bugs/1832907

Package Information:

https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.19.04.1

https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.10.1

https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.18.04.1

https://launchpad.net/ubuntu/+source/firefox/67.0.2+build2-0ubuntu0.16.04.1


--NS1i8CEPaEvMGqec85awsrf6EHKl24sp4--

--O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl0EBs8ACgkQYR+97NWU
bg8mtgf/XdST+iqHe0e9uzwHZG4RV7AuTpltb39M3IFJ1qkRmsXjom9cRAiTSQRh
2tqUIA3YXmTFbypo/MO0yzpqpk/Il6GCDSKXwzOKNZueUNiQkzyScEcMM6wWYX1m
FdErD9tSyCNdDktkwqX2nuhtlPt/whPzbrUzHht8wsFhEOdNC/jwn3xbMkb4C92h
b1AO+HolMo3WbmFEYo77cWBgfBIGbUudMuBUmV8dsFMmweVPnhgpfH+UrOWNPphn
cf7ABt+nfNL0R8cohRYh3Px7KmlgSNmgHZY+bQI91hZpiuF/zoMY/mVwBoi8kerf
cBqAcrJYNiaqG14rIzOgeyRwW2Ur3g==
=ouJY
-----END PGP SIGNATURE-----

--O7QmWfPpLTiHazF4Bwj2xZAHvxhYrXwgP--


--===============6164437547188433698==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

--===============6164437547188433698==--
Pro-Linux
Traut euch!
Neue Nachrichten
Werbung