=========================================================================Ubuntu Security Notice USN-2743-3
September 24, 2015

unity-firefox-extension, webapps-greasemonkey, webaccounts-browser-extension update
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 15.04
- Ubuntu 14.04 LTS

Summary:

This update provides compatible packages for Firefox 41

Software Description:
- unity-firefox-extension: Unity Integration for Firefox
- webaccounts-browser-extension: Ubuntu Online Accounts extension for chromium
- webapps-greasemonkey: Firefox extension: Website Integration

Details:

USN-2743-1 fixed vulnerabilities in Firefox. Future Firefox updates will
require all addons be signed and unity-firefox-extension, webapps-greasemonkey
and webaccounts-browser-extension will not go through the signing process.
Because these addons currently break search engine installations (LP:
#1069793), this update permanently disables the addons by removing them from
the system.

We apologize for any inconvenience.

Original advisory details:

 Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David
 Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup
 discovered multiple memory safety issues in Firefox. If a user were
 tricked in to opening a specially crafted website, an attacker could
 potentially exploit these to cause a denial of service via application
 crash, or execute arbitrary code with the privileges of the user invoking
 Firefox. (CVE-2015-4500, CVE-2015-4501)
 
 André Bargull discovered that when a web page creates a scripted proxy
 for the window with a handler defined a certain way, a reference to the
 inner window will be passed, rather than that of the outer window.
 (CVE-2015-4502)
 
 Felix Gröbert discovered an out-of-bounds read in the QCMS color
 management library in some circumstances. If a user were tricked in to
 opening a specially crafted website, an attacker could potentially exploit
 this to cause a denial of service via application crash, or obtain
 sensitive information. (CVE-2015-4504)
 
 Khalil Zhani discovered a buffer overflow when parsing VP9 content in some
 circumstances. If a user were tricked in to opening a specially crafted
 website, an attacker could potentially exploit this to cause a denial of
 service via application crash, or execute arbitrary code with the
 privileges of the user invoking Firefox. (CVE-2015-4506)
 
 Spandan Veggalam discovered a crash while using the debugger API in some
 circumstances. If a user were tricked in to opening a specially crafted
 website whilst using the debugger, an attacker could potentially exploit
 this to execute arbitrary code with the privileges of the user invoking
 Firefox. (CVE-2015-4507)
 
 Juho Nurminen discovered that the URL bar could display the wrong URL in
 reader mode in some circumstances. If a user were tricked in to opening a
 specially crafted website, an attacker could potentially exploit this to
 conduct URL spoofing attacks. (CVE-2015-4508)
 
 A use-after-free was discovered when manipulating HTML media content in
 some circumstances. If a user were tricked in to opening a specially
 crafted website, an attacker could potentially exploit this to cause a
 denial of service via application crash, or execute arbitrary code with
 the privileges of the user invoking Firefox. (CVE-2015-4509)
 
 Looben Yang discovered a use-after-free when using a shared worker with
 IndexedDB in some circumstances. If a user were tricked in to opening a
 specially crafted website, an attacker could potentially exploit this to
 cause a denial of service via application crash, or execute arbitrary code
 with the privileges of the user invoking Firefox. (CVE-2015-4510)
 
 Francisco Alonso discovered an out-of-bounds read during 2D canvas
 rendering in some circumstances. If a user were tricked in to opening a
 specially crafted website, an attacker could potentially exploit this to
 obtain sensitive information. (CVE-2015-4512)
 
 Jeff Walden discovered that changes could be made to immutable properties
 in some circumstances. If a user were tricked in to opening a specially
 crafted website, an attacker could potentially exploit this to execute
 arbitrary script in a privileged scope. (CVE-2015-4516)
 
 Ronald Crane reported multiple vulnerabilities. If a user were tricked in
 to opening a specially crafted website, an attacker could potentially
 exploit these to cause a denial of service via application crash, or
 execute arbitrary code with the privileges of the user invoking Firefox.
 (CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174,
 CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)
 
 Mario Gomes discovered that dragging and dropping an image after a
 redirect exposes the redirected URL to scripts. An attacker could
 potentially exploit this to obtain sensitive information. (CVE-2015-4519)
 
 Ehsan Akhgari discovered 2 issues with CORS preflight requests. An
 attacker could potentially exploit these to bypass CORS restrictions.
 (CVE-2015-4520)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 15.04:
  xul-ext-unity                   3.0.0+14.04.20140416-0ubuntu1.15.04.1
  xul-ext-webaccounts             0.5-0ubuntu4.15.04.1
  xul-ext-websites-integration    2.3.6+14.10.20140701-0ubuntu1.15.04.1

Ubuntu 14.04 LTS:
  xul-ext-unity                   3.0.0+14.04.20140416-0ubuntu1.14.04.1
  xul-ext-webaccounts             0.5-0ubuntu2.14.04.1
  xul-ext-websites-integration    2.3.6+13.10.20130920.1-0ubuntu1.2

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-2743-3
  https://ubuntu.com/security/notices/USN-2743-1
  https://launchpad.net/bugs/1069793, https://launchpad.net/bugs/1498681

Package Information:
  https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.04.20140416-0ubuntu1.15.04.1
  https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-0ubuntu4.15.04.1
  https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+14.10.20140701-0ubuntu1.15.04.1
  https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.04.20140416-0ubuntu1.14.04.1
  https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-0ubuntu2.14.04.1
  https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+13.10.20130920.1-0ubuntu1.2


Ubuntu 2743-3: Unity Integration for Firefox, Unity Websites

September 24, 2015
This update provides compatible packages for Firefox 41

Summary

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: xul-ext-unity 3.0.0+14.04.20140416-0ubuntu1.15.04.1 xul-ext-webaccounts 0.5-0ubuntu4.15.04.1 xul-ext-websites-integration 2.3.6+14.10.20140701-0ubuntu1.15.04.1 Ubuntu 14.04 LTS: xul-ext-unity 3.0.0+14.04.20140416-0ubuntu1.14.04.1 xul-ext-webaccounts 0.5-0ubuntu2.14.04.1 xul-ext-websites-integration 2.3.6+13.10.20130920.1-0ubuntu1.2 After a standard system update you need to restart Firefox to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-2743-3

https://ubuntu.com/security/notices/USN-2743-1

https://launchpad.net/bugs/1069793, https://launchpad.net/bugs/1498681

Severity
September 24, 2015

Package Information

https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.04.20140416-0ubuntu1.15.04.1 https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-0ubuntu4.15.04.1 https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+14.10.20140701-0ubuntu1.15.04.1 https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.04.20140416-0ubuntu1.14.04.1 https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-0ubuntu2.14.04.1 https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+13.10.20130920.1-0ubuntu1.2

Related News