Login
Newsletter
Werbung

Sicherheit: Ausführen beliebiger Kommandos in Firefox
Aktuelle Meldungen Distributionen
Name: Ausführen beliebiger Kommandos in Firefox
ID: USN-4032-1
Distribution: Ubuntu
Plattformen: Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 18.10, Ubuntu 19.04
Datum: Mo, 24. Juni 2019, 18:35
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11708
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.19.04.1
Applikationen: Mozilla Firefox

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============9048827631881531633==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="SGdzDKmqn8iusIBc7z35uXT7OUEra3iZZ"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--SGdzDKmqn8iusIBc7z35uXT7OUEra3iZZ
Content-Type: multipart/mixed;
boundary="7o0QokNv7K9Srnr5pYoKGtKBzo6DWPupI";
protected-headers="v1"
From: Chris Coulson <chris.coulson@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <efbf7a0e-36fe-e4ad-cf9e-8dcebedd03b1@canonical.com>
Subject: [USN-4032-1] Firefox vulnerability

--7o0QokNv7K9Srnr5pYoKGtKBzo6DWPupI
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: base64
Content-Language: en-US

==========================================================================
Ubuntu Security Notice USN-4032-1
June 24, 2019

firefox vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 19.04
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS

Summary:

A sandbox escape was discovered in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

It was discovered that a sandboxed child process could open arbitrary web
content in the parent process via the Prompt:Open IPC message. When
combined with another vulnerability, an attacker could potentially exploit
this to execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 19.04:
  firefox                         67.0.4+build1-0ubuntu0.19.04.1

Ubuntu 18.10:
  firefox                         67.0.4+build1-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
  firefox                         67.0.4+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
  firefox                         67.0.4+build1-0ubuntu0.16.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
  https://usn.ubuntu.com/4032-1
  CVE-2019-11708

Package Information:
 
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.19.04.1
 
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.18.10.1
 
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.18.04.1
 
https://launchpad.net/ubuntu/+source/firefox/67.0.4+build1-0ubuntu0.16.04.1
???Co??R?z???
ҁΎ?X??!!??2??"??s??????????e???ק?<?y?i?'?*'??)?('j۫zv?
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung