[USN-3778-1] Firefox vulnerabilities


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–===============0439713085103260488==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol=”application/pgp-signature”;
boundary=”UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7″

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7
Content-Type: multipart/mixed; boundary=”TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs”;
protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3778-1] Firefox vulnerabilities

–TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

==========================
==========================
========================
Ubuntu Security Notice USN-3778-1
October 03, 2018

firefox vulnerabilities
==========================
==========================
========================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

A crash was discovered in TransportSecurityInfo used for SSL, which could=

be triggered by data stored in the local cache directory. An attacker
could potentially exploit this in combination with another vulnerability
that allowed them to write data to the cache, to execute arbitrary code.
(CVE-2018-12385)

A type confusion bug was discovered in JavaScript. If a user were tricked=

in to opening a specially crafted website, an attacker could exploit this=

to cause a denial of service, or execute arbitrary code. (CVE-2018-12386)=

It was discovered that the Array.prototype.push could leak memory
addresses to the calling function in some circumstances. An attacker coul=
d
exploit this in combination with another vulnerability to help execute
arbitrary code. (CVE-2018-12387)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.04 LTS:
firefox 62.0.3+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
firefox 62.0.3+build1-0ubuntu0.16.04.2

Ubuntu 14.04 LTS:
firefox 62.0.3+build1-0ubuntu0.14.04.2

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3778-1
CVE-2018-12385, CVE-2018-12386, CVE-2018-12387

Package Information:
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.18.=
04.1
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.16.=
04.2
https://launchpad.net/ubuntu/+source/firefox/62.0.3+build1-0ubuntu0.14.=
04.2

–TxovEsSZ7Fntop0zgCIEFWa2Pqc2akAvs–

–UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlu016IACgkQYR+97NWU
bg/gjAf/R248JwHg1VLEn8BhbRM8PklG7fDYO7p2Go1VzhlNYtkU9L1dT9bVcmma
EowynUE+O/dV3eOF5rFK8Ok8XjlXNRQ0SGBXSlEVTk1VSOak+l4kRODlEu8y9U65
ginBgSL9KTB1OEDVXqHIeo6mULY9OrMuQJINZ/o3t8KNTx8ak1bgENpbdlnKxaaJ
mebVT2KZuM5ILHxG/IA2zOTXYQJyr4LBUiYCU5h6uxPBnONJDWnnl8RwSSTvfH7b
jORYRLCpmh8mo/Da0EvkobCipyYUK1lyxjD1ObZEJULZzrlbphG5aC7owxAyPWjv
v5jnYMYRcrvbBvY2MYct2WJtyHQVMQ==
=Qhau
—–END PGP SIGNATURE—–

–UDirKYGoNsrtMTQlNwuY6CyKtqOgnCHg7–

–===============0439713085103260488==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============0439713085103260488==–