Ubuntu 4122-1: Firefox vulnerabilities

    Date04 Sep 2019
    CategoryUbuntu
    2234
    Posted ByLinuxSecurity Advisories
    Firefox could be made to crash or run programs as your login if it opened a malicious website.
    ==========================================================================
    Ubuntu Security Notice USN-4122-1
    September 04, 2019
    
    firefox vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 19.04
    - Ubuntu 18.04 LTS
    - Ubuntu 16.04 LTS
    
    Summary:
    
    Firefox could be made to crash or run programs as your login if it
    opened a malicious website.
    
    Software Description:
    - firefox: Mozilla Open Source web browser
    
    Details:
    
    Multiple security issues were discovered in Firefox. If a user were
    tricked in to opening a specially crafted website, an attacker could
    potentially exploit these to obtain sensitive information, bypass
    Content Security Policy (CSP) protections, bypass same-origin
    restrictions, conduct cross-site scripting (XSS) attacks, cause a denial
    of service, or execute arbitrary code. (CVE-2019-5849, CVE-2019-11734,
    CVE-2019-11735, CVE-2019-11737, CVE-2019-11738, CVE-2019-11740,
    CVE-2019-11742, CVE-2019-11743, CVE-2019-11744, CVE-2019-11746,
    CVE-2019-11748, CVE-2019-11749, CVE-2019-11750, CVE-2019-11752)
    
    It was discovered that a compromised content process could log in to a
    malicious Firefox Sync account. An attacker could potentially exploit
    this, in combination with another vulnerability, to disable the sandbox.
    (CVE-2019-9812)
    
    It was discovered that addons.mozilla.org and accounts.firefox.com could
    be loaded in to the same content process. An attacker could potentially
    exploit this, in combination with another vulnerability that allowed a
    cross-site scripting (XSS) attack, to modify browser settings.
    (CVE-2019-11741)
    
    It was discovered that the "Forget about this site" feature in the
    history pane removes HTTP Strict Transport Security (HSTS) settings for
    sites on the pre-load list. An attacker could potentially exploit this
    to bypass the protections offered by HSTS. (CVE-2019-11747)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 19.04:
      firefox                         69.0+build2-0ubuntu0.19.04.1
    
    Ubuntu 18.04 LTS:
      firefox                         69.0+build2-0ubuntu0.18.04.1
    
    Ubuntu 16.04 LTS:
      firefox                         69.0+build2-0ubuntu0.16.04.4
    
    After a standard system update you need to restart Firefox to make
    all the necessary changes.
    
    References:
      https://usn.ubuntu.com/4122-1
      CVE-2019-11734, CVE-2019-11735, CVE-2019-11737, CVE-2019-11738,
      CVE-2019-11740, CVE-2019-11741, CVE-2019-11742, CVE-2019-11743,
      CVE-2019-11744, CVE-2019-11746, CVE-2019-11747, CVE-2019-11748,
      CVE-2019-11749, CVE-2019-11750, CVE-2019-11752, CVE-2019-5849,
      CVE-2019-9812
    
    Package Information:
      https://launchpad.net/ubuntu/+source/firefox/69.0+build2-0ubuntu0.19.04.1
      https://launchpad.net/ubuntu/+source/firefox/69.0+build2-0ubuntu0.18.04.1
      https://launchpad.net/ubuntu/+source/firefox/69.0+build2-0ubuntu0.16.04.4
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"15","type":"x","order":"1","pct":53.57,"resources":[]},{"id":"88","title":"Should be more technical","votes":"4","type":"x","order":"2","pct":14.29,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"9","type":"x","order":"3","pct":32.14,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.