This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============2920573023651123448==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="HoVgWkDW1BWL0EffIaWvcNpuvOPCHxlNY"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--HoVgWkDW1BWL0EffIaWvcNpuvOPCHxlNY
Content-Type: multipart/mixed; boundary="fFfD9L4b8zmCNAzJTZZjlA5nzsUcxCLnH";
protected-headers="v1"
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <97e49418-2abf-489c-9851-85b68da9735a@canonical.com>
Subject: [USN-3874-1] Firefox vulnerabilities
--fFfD9L4b8zmCNAzJTZZjlA5nzsUcxCLnH
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
==========================================================================
Ubuntu Security Notice USN-3874-1
January 30, 2019
firefox vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it
opened a malicious website.
Software Description:
- firefox: Mozilla Open Source web browser
Details:
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, gain additional
privileges by escaping the sandbox, or execute arbitrary code.
(CVE-2018-18500, CVE-2018-18501, CVE-2018-18502, CVE-2018-18503,
CVE-2018-18504, CVE-2018-18505)
It was discovered that Firefox allowed PAC files to specify that requests
to localhost are sent through the proxy to another server. If proxy
auto-detection is enabled, an attacker could potentially exploit this to
conduct attacks on local services and tools. (CVE-2018-18506)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.10:
firefox 65.0+build2-0ubuntu0.18.10.1
Ubuntu 18.04 LTS:
firefox 65.0+build2-0ubuntu0.18.04.1
Ubuntu 16.04 LTS:
firefox 65.0+build2-0ubuntu0.16.04.1
Ubuntu 14.04 LTS:
firefox 65.0+build2-0ubuntu0.14.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3874-1
CVE-2018-18500, CVE-2018-18501, CVE-2018-18502, CVE-2018-18503,
CVE-2018-18504, CVE-2018-18505, CVE-2018-18506
Package Information:
https://launchpad.net/ubuntu/+source/firefox/65.0+build2-0ubuntu0.18.10.1
https://launchpad.net/ubuntu/+source/firefox/65.0+build2-0ubuntu0.18.04.1
https://launchpad.net/ubuntu/+source/firefox/65.0+build2-0ubuntu0.16.04.1
https://launchpad.net/ubuntu/+source/firefox/65.0+build2-0ubuntu0.14.04.1
--fFfD9L4b8zmCNAzJTZZjlA5nzsUcxCLnH--
--HoVgWkDW1BWL0EffIaWvcNpuvOPCHxlNY
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlxSL6IACgkQYR+97NWU
bg+ETwf7BMUXzWYejb4dv039fcLW+JTsoQwuS7RoRhpSdb/HdK66IdQtV5bEQ51A
EANsFVo5xiKpQyWRs6lVIzMbQgItZxEW7qfld92xGYrHm9pYidkYxlA88GvoX+kS
offbWd5yNARrbQLpyQsB+yhBVioxGBItgv8dnG7Z/CNRLFNW+dInNg2j8OGkXWdF
hHEcVxgblj6Hui+rQvHgUSaZ942jvPD2DzO5fxRboRLZfmYVQEPxVv/bJqoOFLYI
QlgoGYHXJmf7fnE0HrPfNITxIKNCIeXAQzjD4CUmNbx7yadzetfA9SBuyMgVXALc
5xurehe3U1bbkB0yejMbingiujyPXA==
=qPpv
-----END PGP SIGNATURE-----
--HoVgWkDW1BWL0EffIaWvcNpuvOPCHxlNY--
--===============2920573023651123448==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============2920573023651123448==--
|