This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============1923504144302717979==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="XM579lgNUmvkz1BOV8nVHTC41l8t0W5Q1"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--XM579lgNUmvkz1BOV8nVHTC41l8t0W5Q1
Content-Type: multipart/mixed; boundary="sOOKfyLyBKVvgE7gPg3Qtm0WqwhucCMF6";
protected-headers="v1"
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <9d003984-2573-2204-7e66-f021bf6d787a@canonical.com>
Subject: [USN-3918-2] Firefox vulnerabilities
--sOOKfyLyBKVvgE7gPg3Qtm0WqwhucCMF6
Content-Type: text/plain; charset=utf-
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US
==========================================================================
Ubuntu Security Notice USN-3918-2
March 25, 2019
firefox vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Firefox.
Software Description:
- firefox: Mozilla Open Source web browser
Details:
USN-3918-1 fixed vulnerabilities in Firefox. This update provides the
corresponding updates for Ubuntu 14.04 LTS.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, denial of service via successive FTP authorization prompts or modal
alerts, trick the user with confusing permission request prompts, obtain
sensitive information, conduct social engineering attacks, or execute
arbitrary code. (CVE-2019-9788, CVE-2019-9789, CVE-2019-9790,
CVE-2019-9791, CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9797,
CVE-2019-9799, CVE-2019-9802, CVE-2019-9805, CVE-2019-9806, CVE-2019-9807,
CVE-2019-9808, CVE-2019-9809)
A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website with
Spectre mitigations disabled, an attacker could potentially exploit this
to cause a denial of service, or execute arbitrary code. (CVE-2019-9793)
It was discovered that Upgrade-Insecure-Requests was incorrectly enforced
for same-origin navigation. An attacker could potentially exploit this to
conduct man-in-the-middle (MITM) attacks. (CVE-2019-9803)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS:
firefox 66.0.1+build1-0ubuntu0.14.04.1
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
https://usn.ubuntu.com/usn/usn-3918-2
https://usn.ubuntu.com/usn/usn-3918-1
CVE-2019-9788, CVE-2019-9789, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796,
CVE-2019-9797, CVE-2019-9799, CVE-2019-9802, CVE-2019-9803,
CVE-2019-9805, CVE-2019-9806, CVE-2019-9807, CVE-2019-9808,
CVE-2019-9809
Package Information:
https://launchpad.net/ubuntu/+source/firefox/66.0.1+build1-0ubuntu0.14.04.1
--sOOKfyLyBKVvgE7gPg3Qtm0WqwhucCMF6--
--XM579lgNUmvkz1BOV8nVHTC41l8t0W5Q1
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlyY6YQACgkQYR+97NWU
bg/ZYgf/ZeUmNgD+vZjJMEMuzOBDCQH/KqqkmYAgAaJ//s5CEeb0F963Jo5T6Jnq
wlHhueKftxb8lOIyFJik7qJO06PIZmHUBJyGMMYpmcKCV8MHjheMA9TpOalQ7mtj
HxgcqFJ2Gyb2+Dyb/1OZ7vruytIPENIQI+lUR2E2saaVQXtm3RkdwWkvc6D8Aobw
05EjrWd8JvczGvguYbYVrPK7wtBuwVLGVmFnqMPsfinjLas9aAfXJJr5O+/RzqPG
eXSzDZRAC7J/o84NqY4PDUr3lpaS0P/8O1O/2sDTdeTI8VQAJf8A1INd2FVv7rvm
T5MPMCd5G2e6Xcw3SZcSdAsZ/0ApXw==
=qra7
-----END PGP SIGNATURE-----
--XM579lgNUmvkz1BOV8nVHTC41l8t0W5Q1--
--===============1923504144302717979==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK
--===============1923504144302717979==--
|