This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============3734880919300342235== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="bwsR9evuVaUKucnj7gazKIOY5lBp5J3ki"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --bwsR9evuVaUKucnj7gazKIOY5lBp5J3ki Content-Type: multipart/mixed; boundary="49X2QAU6UnDLbspOL8HwBBdMJMtWpKU9a"
--49X2QAU6UnDLbspOL8HwBBdMJMtWpKU9a Content-Type: text/plain; charset=utf-8 Content-Language: en-U Content-Transfer-Encoding: quoted-printable
========================================================================== Ubuntu Security Notice USN-4443-1 July 29, 2020
firefox vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS - Ubuntu 18.04 LTS - Ubuntu 16.04 LTS
Summary:
Firefox could be made to crash or run programs as your login if it opened a malicious website.
Software Description: - firefox: Mozilla Open Source web browser
Details:
Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information, bypass iframe sandbox restrictions, confuse the user, or execute arbitrary code. (CVE-2020-6463, CVE-2020-6514, CVE-2020-15652, CVE-2020-15653, CVE-2020-15654, CVE-2020-15656, CVE-2020-15658, CVE-2020-15659)
It was discovered that redirected HTTP requests which are observed or modified through a web extension could bypass existing CORS checks. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit this to obtain sensitive information across origins. (CVE-2020-15655)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS: firefox 79.0+build1-0ubuntu0.20.04.1
Ubuntu 18.04 LTS: firefox 79.0+build1-0ubuntu0.18.04.1
Ubuntu 16.04 LTS: firefox 79.0+build1-0ubuntu0.16.04.2
After a standard system update you need to restart Firefox to make all the necessary changes.
References: https://usn.ubuntu.com/4443-1 CVE-2020-15652, CVE-2020-15653, CVE-2020-15654, CVE-2020-15655, CVE-2020-15656, CVE-2020-15658, CVE-2020-15659, CVE-2020-6463, CVE-2020-6514
Package Information: https://launchpad.net/ubuntu/+source/firefox/79.0+build1-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/firefox/79.0+build1-0ubuntu0.18.04.1 https://launchpad.net/ubuntu/+source/firefox/79.0+build1-0ubuntu0.16.04.2
--49X2QAU6UnDLbspOL8HwBBdMJMtWpKU9a--
--bwsR9evuVaUKucnj7gazKIOY5lBp5J3ki Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc"
-----BEGIN PGP SIGNATURE-----
iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl8hzrUACgkQYR+97NWU bg/UrggAp/KeIDKiZkVTetGzl8biZR09QzNtXzVBGkGaOXZwdr5PAdVx3iJAYKTU zqyFUCxAc5qk+bkADIjSqradQYIL5dnoNLWY1nk+qUQAmcSjUGH1YrvjX9ptYum1 vAlJlS+89jojX4tJlntXHQaCGCrqXVnHq2d6q5u+dWGYDaAU9g3w9nHI4Fo3P1PS Ws6kJHmqB4TPKVlm7/ALQ6wAIY4bSgeCQLtxr/5TR1cOLkARwhptgcZUd3oEllp+ 4u6D9cYdw3FyK4dM5sG3BFDE6qPhycOWTcZr0TwAzTVdJdn4e/1UmYJyf8mxNkux S2MX1XayGTJjIhCPnkGT9MsO8QKswg== =KywR -----END PGP SIGNATURE-----
--bwsR9evuVaUKucnj7gazKIOY5lBp5J3ki--
--===============3734880919300342235== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5 LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj dXJpdHktYW5ub3VuY2UK
--===============3734880919300342235==--
|