Monday, October 26, 2020

[USN-4599-2] Firefox vulnerabilities

-----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEERN//5MGgCOgyKeIFYR+97NWUbg8FAl+XTtAACgkQYR+97NWU
bg9WMAf9Fm/AyDWEcEf7WwRftylRfyJLoY0UZ54eeS3rFnT6XWMou0qKuPN8NDht
Ur64WnykRW5lC/cV66+Eo631dpoFMRjs3xmKn2b0gK8NfPUByN/Vrd+sDQx6qX0a
+OX7cyQC8Y8iYlDXkwQk9Ki+WZU808mmATUbi+XDJP3rydaEOYcV9i17VBG5aTgQ
9Nq8RLNUhZhkozkMl4fzn42ePvrjisp4V8pOw4Zu0I+n8HzObrW9TnVKFWE3XnA1
kXN8cnGS20dAvXDnDriweFYn0kxKHw/P5HYxLdOw/dzKPkc1Z/KaFBsA7VLO6q3G
AhBC9EoHjnwwpXj3s5IbtRAcXZEFzg==
=bmPG
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-4599-2
October 26, 2020

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS

Summary:

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-4599-1 fixed vulnerabilities in Firefox. This update provides the
corresponding updates for Ubuntu 16.04 LTS.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, spoof the prompt
for opening an external application, obtain sensitive information, or
execute
arbitrary code.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
firefox 82.0+build2-0ubuntu0.16.04.5

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
https://usn.ubuntu.com/4599-2
https://usn.ubuntu.com/4599-1
CVE-2020-15254, CVE-2020-15680, CVE-2020-15681, CVE-2020-15682,
CVE-2020-15683, CVE-2020-15684, CVE-2020-15969

Package Information:
https://launchpad.net/ubuntu/+source/firefox/82.0+build2-0ubuntu0.16.04.5

No comments:

Post a Comment