This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============0592235691339804950== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="a5zVg4t21YKvJfjoZxtn5I47NwVJvLcpY"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --a5zVg4t21YKvJfjoZxtn5I47NwVJvLcpY Content-Type: multipart/mixed; boundary="FHvN73SbXRgkjx3CbKxJUkWihwKQmLsft"
--FHvN73SbXRgkjx3CbKxJUkWihwKQmLsft Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4353-1 May 07, 2020
firefox vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 19.10 - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Software Description: - firefox: Mozilla Open Source web browser
Details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, bypass security restrictions, spoof the URL bar, or execute arbitrary code. (CVE-2020-6831, CVE-2020-12387, CVE-2020-12390, CVE-2020-12391, CVE-2020-12394, CVE-2020-12395, CVE-2020-12396)
It was discovered that the Devtoolsâ âCopy as cURLâ feature did not properly HTTP POST data of a request. If a user were tricked in to using the âCopy as cURLâ feature to copy and paste a command with specially crafted data in to a terminal, an attacker could potentially exploit this to obtain sensitive information from local files. (CVE-2020-12392)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: firefox 76.0+build2-0ubuntu0.20.04.1
Ubuntu 19.10: firefox 76.0+build2-0ubuntu0.19.10.1
Ubuntu 18.04 LTS: firefox 76.0+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS: firefox 76.0+build2-0ubuntu0.16.04.1
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://usn.ubuntu.com/4353-1 CVE-2020-12387, CVE-2020-12390, CVE-2020-12391, CVE-2020-12392, CVE-2020-12394, CVE-2020-12395, CVE-2020-12396, CVE-2020-6831
Package Information: https://launchpad.net/ubuntu/+source/firefox/76.0+build2-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/firefox/76.0+build2-0ubuntu0.19.10.1 https://launchpad.net/ubuntu/+source/firefox/76.0+build2-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/firefox/76.0+build2-0ubuntu0.16.04.1
--FHvN73SbXRgkjx3CbKxJUkWihwKQmLsft--
--a5zVg4t21YKvJfjoZxtn5I47NwVJvLcpY Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl60JbEACgkQYR+97NWU bg9EUgf8C1gsM79uSr/dWmxBpUpbFGq2xaJBzLvgR+RzYOgo5dzpvIIaGwsvdaQ9 RKcVfbBVJ7FWJJFngNx7K1FMKy59ZF6rYAbwDLajWHliCe6Uk/y11BgpbgmkDSBG aVUOkRNe6i4W3ilitDGbXT1CWgLAtrpnQTKcfKybejecLwBvVUDyZTxYyfC5GLc1 tuyO/Ugi0EAYOhyZAa18zDMtdoPmGRn0IH4qLXx8BDuyAhq+NCe7q3fYVGG5Yf/Q y5gAMIjwcGyutEoicakBgBI6y3s3ABLkiv6GKBTRnkm28zuD16eKsBdfc1XsLI7s IFj9iho6TZ/mc/3n7KSJhwfaOphASA== =Q1/q -----END PGP SIGNATURE-----
--a5zVg4t21YKvJfjoZxtn5I47NwVJvLcpY--
--===============0592235691339804950== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============0592235691339804950==--
|