[USN-3682-1] Firefox vulnerability


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============5374230177399147675==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”41p8VD2aXuY2rL9GOLtocBKuZZ3negWay”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–41p8VD2aXuY2rL9GOLtocBKuZZ3negWay
Content-Type: multipart/mixed; boundary=”W2qPac7dIHIAqWQ7jakzrII7ZoFYCpwKV”;
protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3682-1] Firefox vulnerability

–W2qPac7dIHIAqWQ7jakzrII7ZoFYCpwKV
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3682-1
June 12, 2018

firefox vulnerability
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 17.10
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

A heap buffer overflow was discovered in Skia. If a user were tricked in
to opening a specially crafted website, an attacker could potentially
exploit this to cause a denial of service, or execute arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
firefox 60.0.2+build1-0ubuntu0.18.04.1

Ubuntu 17.10:
firefox 60.0.2+build1-0ubuntu0.17.10.1

Ubuntu 16.04 LTS:
firefox 60.0.2+build1-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
firefox 60.0.2+build1-0ubuntu0.14.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3682-1
CVE-2018-6126

Package Information:
https://launchpad.net/ubuntu/+source/firefox/60.0.2+build1-0ubuntu0.18.=
04.1
https://launchpad.net/ubuntu/+source/firefox/60.0.2+build1-0ubuntu0.17.=
10.1
https://launchpad.net/ubuntu/+source/firefox/60.0.2+build1-0ubuntu0.16.=
04.1
https://launchpad.net/ubuntu/+source/firefox/60.0.2+build1-0ubuntu0.14.=
04.1

–W2qPac7dIHIAqWQ7jakzrII7ZoFYCpwKV–

–41p8VD2aXuY2rL9GOLtocBKuZZ3negWay
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlsgQukACgkQYR+97NWU
bg/pHwf/S9ft1nmAH5J+1np+8HSUO/8QE1H/MP6PgKrbVJBle4ErpZxTpJYgMWlZ
9hNXcm7EU7rFRHW3OwzsNRTXGzLuhW1wq8UYi22HmZBezNmq+sFBso9G76yiTrLY
bWoDf/kOo00qQL2vMIafbnob2S4jGb6o4+EnlirM006FFLsL2I2kY+N05yMlrVMs
e34ak7Zo6jgPngECj+DZphAdHcXvsa1KLZIguHpa7qo4kJfvfpzUu3oOLEBpstlP
I+nauGNEbxztkWW/g9brNx7ct1CMPqHc7yFQdXIhIC2BGdW7/pBxTz+rPvjYsqy9
u15LMfaxNOnoMwXM5y4dmxK2MJQQZQ==
=xVeU
—–END PGP SIGNATURE—–

–41p8VD2aXuY2rL9GOLtocBKuZZ3negWay–

–===============5374230177399147675==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============5374230177399147675==–