[USN-3801-2] Firefox regressions


This is an OpenPGP/MIME signed message (RFC 4880 and 3156)

protocol=”application/pgp-signature”;
boundary=”Ig58feHKsqCLngVbcvz2Ec6IS5iXcdl9b”

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
–Ig58feHKsqCLngVbcvz2Ec6IS5iXcdl9b

protected-headers=”v1″
From: Chris Coulson
Reply-To: Ubuntu Security
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID:
Subject: [USN-3801-2] Firefox regressions

–fSz2SxceIEMyUDIjkmPmwV63lfg5XTBFu

Content-Transfer-Encoding: quoted-printable
Content-Language: en-US

=
=

Ubuntu Security Notice USN-3801-2
November 23, 2018

firefox regressions
=
=

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 18.10
– Ubuntu 18.04 LTS
– Ubuntu 16.04 LTS
– Ubuntu 14.04 LTS

Summary:

USN-3801-1 caused some minor regressions in Firefox.

Software Description:
– firefox: Mozilla Open Source web browser

Details:

USN-3801-1 fixed vulnerabilities in Firefox. The update introduced variou=
s
minor regressions. This update fixes the problems.

We apologize for the inconvenience.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, bypass CSP
restrictions, spoof the protocol registration notification bar, leak
SameSite cookies, bypass mixed content warnings, or execute arbitrary
code. (CVE-2018-12388, CVE-2018-12390, CVE-2018-12392, CVE-2018-12393,
CVE-2018-12398, CVE-2018-12399, CVE-2018-12401, CVE-2018-12402,
CVE-2018-12403)
=20
Multiple security issues were discovered with WebExtensions in Firefox.
If a user were tricked in to installing a specially crafted extension, a=
n
attacker could potentially exploit these to bypass domain restrictions,
gain additional privileges, or run content scripts in local pages withou=
t
permission. (CVE-2018-12395, CVE-2018-12396, CVE-2018-12397)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
firefox 63.0.3+build1-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
firefox 63.0.3+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
firefox 63.0.3+build1-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
firefox 63.0.3+build1-0ubuntu0.14.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3801-2
https://usn.ubuntu.com/usn/usn-3801-1
https://launchpad.net/bugs/1804881

Package Information:
https://launchpad.net/ubuntu/+source/firefox/63.0.3+build1-0ubuntu0.18.=
10.1
https://launchpad.net/ubuntu/+source/firefox/63.0.3+build1-0ubuntu0.18.=
04.1
https://launchpad.net/ubuntu/+source/firefox/63.0.3+build1-0ubuntu0.16.=
04.1
https://launchpad.net/ubuntu/+source/firefox/63.0.3+build1-0ubuntu0.14.=
04.1

–fSz2SxceIEMyUDIjkmPmwV63lfg5XTBFu–

–Ig58feHKsqCLngVbcvz2Ec6IS5iXcdl9b

Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename=”signature.asc”

—–BEGIN PGP SIGNATURE—–

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAlv4ZL8ACgkQYR+97NWU
bg82tgf/YPzWtFZ3ELaFr5KeEMkYymO5Ed0mI4PyOWOgxk4TsO/LkkHiPOjpEUoS
eZQ+W4n3fdLlhv72Zr4aVLAC5dWbeDR3iD32Hiwc2XfYBcxS4Yz2v0aX1P2TCzvr
r9RG71eccCX2kFmbPSb6ftE6/0PiczXtUV84C3APUPcb8ks/tLeTNnj0U2Qk8lKU
D3qgfFrwALLGTbsaESdRm8AZMr8JvMeCFh+WpsN9nejtitzcQdjXFVN4s9xcOoYM
QRErcIyH60L+qjyINj2mPtsBUAoph/2WOd47kO7KfHtFO1X66eJcVId2qxJd7Odp
UWfCQhJmVJs+Jht7otSuBUDmQorqNQ==
=bV10
—–END PGP SIGNATURE—–

–Ig58feHKsqCLngVbcvz2Ec6IS5iXcdl9b–

MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK