Ubuntu 3918-1: Firefox vulnerabilities

    Date21 Mar 2019
    CategoryUbuntu
    3121
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in Firefox.
    ==========================================================================
    Ubuntu Security Notice USN-3918-1
    March 21, 2019
    
    firefox vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 18.10
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Several security issues were fixed in Firefox.
    
    Software Description:
    - firefox: Mozilla Open Source web browser
    
    Details:
    
    Multiple security issues were discovered in Firefox. If a user were
    tricked in to opening a specially crafted website, an attacker could
    potentially exploit these to cause a denial of service via application
    crash, denial of service via successive FTP authorization prompts or modal
    alerts, trick the user with confusing permission request prompts, obtain
    sensitive information, conduct social engineering attacks, or execute
    arbitrary code. (CVE-2019-9788, CVE-2019-9789, CVE-2019-9790,
    CVE-2019-9791, CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9797,
    CVE-2019-9799, CVE-2019-9802, CVE-2019-9805, CVE-2019-9806, CVE-2019-9807,
    CVE-2019-9808, CVE-2019-9809)
    
    A mechanism was discovered that removes some bounds checking for string,
    array, or typed array accesses if Spectre mitigations have been disabled.
    If a user were tricked in to opening a specially crafted website with
    Spectre mitigations disabled, an attacker could potentially exploit this
    to cause a denial of service, or execute arbitrary code. (CVE-2019-9793)
    
    It was discovered that Upgrade-Insecure-Requests was incorrectly enforced
    for same-origin navigation. An attacker could potentially exploit this to
    conduct man-in-the-middle (MITM) attacks. (CVE-2019-9803)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 18.10:
      firefox                         66.0+build3-0ubuntu0.18.10.1
    
    Ubuntu 18.04 LTS:
      firefox                         66.0+build3-0ubuntu0.18.04.1
    
    Ubuntu 16.04 LTS:
      firefox                         66.0+build3-0ubuntu0.16.04.2
    
    After a standard system update you need to restart Firefox to make
    all the necessary changes.
    
    References:
      https://usn.ubuntu.com/usn/usn-3918-1
      CVE-2019-9788, CVE-2019-9789, CVE-2019-9790, CVE-2019-9791,
      CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796,
      CVE-2019-9797, CVE-2019-9799, CVE-2019-9802, CVE-2019-9803,
      CVE-2019-9805, CVE-2019-9806, CVE-2019-9807, CVE-2019-9808,
      CVE-2019-9809
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/66.0+build3-0ubuntu0.18.10.1
      https://launchpad.net/ubuntu/+source/firefox/66.0+build3-0ubuntu0.18.04.1
      https://launchpad.net/ubuntu/+source/firefox/66.0+build3-0ubuntu0.16.04.2
    
    
    You are not authorised to post comments.

    LinuxSecurity Poll

    Do you reuse passwords across multiple accounts?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    13
    radio
    [{"id":"55","title":"Yes","votes":"0","type":"x","order":"1","pct":0,"resources":[]},{"id":"56","title":"No","votes":"0","type":"x","order":"2","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.