[USN-3761-3] Firefox regressions


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============3239141031140076546==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”Om72d5SaPvsvGPAqmwJTeMcB5VUKaIPuZ”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–Om72d5SaPvsvGPAqmwJTeMcB5VUKaIPuZ
Content-Type: multipart/mixed; boundary=”udJRQ9uQ0j8gipwwPS3m52JTNnZg2HZ7L”;
protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3761-3] Firefox regressions

–udJRQ9uQ0j8gipwwPS3m52JTNnZg2HZ7L
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3761-3
September 17, 2018

firefox regressions
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

USN-3761-1 caused several regressions in Firefox.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

USN-3761-1 fixed vulnerabilities in Firefox. The update caused several
regressions affecting spellchecker dictionaries and search engines, which=

were partially fixed by USN-3761-2. This update contains the remaining fi=
x.

We apologize for the inconvenience.

Original advisory details:

=C2=A0Multiple security issues were discovered in Firefox. If a user were=

=C2=A0tricked in to opening a specially crafted website, an attacker coul=
d
=C2=A0potentially exploit these to cause a denial of service, or execute
=C2=A0arbitrary code. (CVE-2018-12375, CVE-2018-12376, CVE-2018-12377,
=C2=A0CVE-2018-12378)
=C2=A0
=C2=A0It was discovered that if a user saved passwords before Firefox 58 =
and
=C2=A0then later set a master password, an unencrypted copy of these pass=
words
=C2=A0would still be accessible. A local user could exploit this to obtai=
n
=C2=A0sensitive information. (CVE-2018-12383)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
=C2=A0 firefox=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 62.0+build2-0ubuntu0.18.04.5

Ubuntu 16.04 LTS:
=C2=A0 firefox=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 62.0+build2-0ubuntu0.16.04.5

Ubuntu 14.04 LTS:
=C2=A0 firefox=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0 62.0+build2-0ubuntu0.14.04.5

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3761-3
=C2=A0 https://usn.ubuntu.com/usn/usn-3761-1
=C2=A0 https://launchpad.net/bugs/1791789, https://usn.ubuntu.com/usn/usn=
-3761-2

Package Information:
=C2=A0 https://launchpad.net/ubuntu/+source/firefox/62.0+build2-0ubuntu0.=
18.04.5
=C2=A0 https://launchpad.net/ubuntu/+source/firefox/62.0+build2-0ubuntu0.=
16.04.5
=C2=A0 https://launchpad.net/ubuntu/+source/firefox/62.0+build2-0ubuntu0.=
14.04.5

–udJRQ9uQ0j8gipwwPS3m52JTNnZg2HZ7L–

–Om72d5SaPvsvGPAqmwJTeMcB5VUKaIPuZ
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlufkksACgkQYR+97NWU
bg8t9ggArr4nh7M+J5/7CLUz5DxNisVtl39eSR9U548zYeb/0EmysA/EHA5nkIaE
fcTciWLeZZrDxuFpE98UUFxRC94MAu2eHqmZ0MEdFgpZfSbSF6dxwJ4sl/ovQTAz
BJUM68vqrc+SAmaApAC+eq4kmhoTfaMc+fyorCoGboem/3ognWslvuCpmVXzlmBe
EtA6C6klNZKMnCQUTIS8vUu5T2rJyjbYP3MXCWp9QUVfpDBMfu/PpVbxUU6HXsSd
xe3KhmYnBdvADotCyHD8ZKBXONsAuGcy3/0okBJ/z99TT/uNqVFh+XClO5Ccax3k
0PM+NW9cRqgJZ/V2/o75iubUu0EPeQ==
=f9gA
—–END PGP SIGNATURE—–

–Om72d5SaPvsvGPAqmwJTeMcB5VUKaIPuZ–

–===============3239141031140076546==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============3239141031140076546==–