{"id":16091,"date":"2017-05-12T05:35:42","date_gmt":"2017-05-11T20:35:42","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-3260-2-firefox-regression\/"},"modified":"2017-05-12T05:35:42","modified_gmt":"2017-05-11T20:35:42","slug":"usn-3260-2-firefox-regression","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-3260-2-firefox-regression\/","title":{"rendered":"USN-3260-2: Firefox regression"},"content":{"rendered":"<p>USN-3260-2: Firefox regression<\/p>\n<h2>Ubuntu Security Notice USN-3260-2<\/h2>\n<p><em>11th May, 2017<\/em><\/p>\n<h3>firefox regression<\/h3>\n<p>A security issue affects these releases of Ubuntu and its<br \/>\n    derivatives:<\/p>\n<ul>\n<li>Ubuntu 17.04<\/li>\n<li>Ubuntu 16.10<\/li>\n<li>Ubuntu 16.04 LTS<\/li>\n<li>Ubuntu 14.04 LTS<\/li>\n<\/ul>\n<h3>Summary<\/h3>\n<p>USN-3260-1 caused a regression in Firefox.\n<\/p>\n<h3>Software description<\/h3>\n<ul>\n<li>firefox<br \/>\n    &#8211; Mozilla Open Source web browser<\/p>\n<\/li>\n<\/ul>\n<h3>Details<\/h3>\n<p>USN-3260-1 fixed vulnerabilities in Firefox. The update caused the<br \/>date picker panel and form validation errors to close immediately on<br \/>opening. This update fixes the problem.<\/p>\n<p>We apologize for the inconvenience.<\/p>\n<p>Original advisory details:<\/p>\n<p> Multiple security issues were discovered in Firefox. If a user were<br \/> tricked in to opening a specially crafted website, an attacker could<br \/> potentially exploit these to read uninitialized memory, obtain sensitive<br \/> information, spoof the addressbar contents or other UI elements, escape<br \/> the sandbox to read local files, conduct cross-site scripting (XSS)<br \/> attacks, cause a denial of service via application crash, or execute<br \/> arbitrary code. (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5429\">CVE-2017-5429<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5430\">CVE-2017-5430<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5432\">CVE-2017-5432<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5433\">CVE-2017-5433<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5434\">CVE-2017-5434<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5435\">CVE-2017-5435<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5436\">CVE-2017-5436<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5437\">CVE-2017-5437<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5438\">CVE-2017-5438<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5439\">CVE-2017-5439<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5440\">CVE-2017-5440<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5441\">CVE-2017-5441<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5442\">CVE-2017-5442<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5443\">CVE-2017-5443<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5444\">CVE-2017-5444<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5445\">CVE-2017-5445<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5446\">CVE-2017-5446<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5447\">CVE-2017-5447<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5448\">CVE-2017-5448<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5449\">CVE-2017-5449<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5451\">CVE-2017-5451<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5453\">CVE-2017-5453<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5454\">CVE-2017-5454<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5455\">CVE-2017-5455<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5456\">CVE-2017-5456<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5458\">CVE-2017-5458<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5459\">CVE-2017-5459<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5460\">CVE-2017-5460<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5461\">CVE-2017-5461<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5464\">CVE-2017-5464<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5465\">CVE-2017-5465<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5466\">CVE-2017-5466<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5467\">CVE-2017-5467<\/a>,<br \/> <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5468\">CVE-2017-5468<\/a>, <a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5469\">CVE-2017-5469<\/a>)<\/p>\n<p> A flaw was discovered in the DRBG number generation in NSS. If an<br \/> attacker were able to perform a man-in-the-middle attack, this flaw<br \/> could potentially be exploited to view sensitive information.<br \/> (<a href=\"http:\/\/people.ubuntu.com\/~ubuntu-security\/cve\/CVE-2017-5462\">CVE-2017-5462<\/a>)<\/p>\n<h3>Update instructions<\/h3>\n<p> The problem can be corrected by updating your system to the following<br \/>\npackage version:<\/p>\n<dl>\n<dt>Ubuntu 17.04:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0.2+build1-0ubuntu0.17.04.2\">53.0.2+build1-0ubuntu0.17.04.2<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.10:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0.2+build1-0ubuntu0.16.10.2\">53.0.2+build1-0ubuntu0.16.10.2<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 16.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0.2+build1-0ubuntu0.16.04.2\">53.0.2+build1-0ubuntu0.16.04.2<\/a><br \/>\n    <\/span>\n  <\/dd>\n<dt>Ubuntu 14.04 LTS:<\/dt>\n<dd>\n    <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\">firefox<\/a><br \/>\n    <span><br \/>\n        <a href=\"https:\/\/launchpad.net\/ubuntu\/+source\/firefox\/53.0.2+build1-0ubuntu0.14.04.2\">53.0.2+build1-0ubuntu0.14.04.2<\/a><br \/>\n    <\/span>\n  <\/dd>\n<\/dl>\n<p>To update your system, please follow these instructions:<br \/>\n<a href=\"https:\/\/wiki.ubuntu.com\/Security\/Upgrades\">https:\/\/wiki.ubuntu.com\/Security\/Upgrades<\/a>.\n<\/p>\n<p>After a standard system update you need to restart Firefox to make<br \/>all the necessary changes.<\/p>\n<h3>References<\/h3>\n<p>        <a href=\"https:\/\/launchpad.net\/bugs\/1690195\">LP: 1690195<\/a><\/p>\n<p>Source: <a href=\"http:\/\/www.ubuntu.com\/usn\/usn-3260-2\/\" target=\"_blank\">USN-3260-2: Firefox regression<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-3260-2: Firefox regression Ubuntu Security Notice USN-3260-2 11th May, 2017 firefox regression A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.04 Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary USN-3260-1 caused a regression in Firefox. Software description firefox &#8211; Mozilla Open Source web browser Details USN-3260-1 fixed vulnerabilities in Firefox. The update caused thedate picker panel and form validation errors to close immediately onopening. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to read uninitialized memory, obtain sensitive information, spoof the addressbar contents or other UI elements, escape the sandbox to read local files, conduct cross-site scripting (XSS) attacks, cause a denial of service via <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-3260-2-firefox-regression\/\" title=\"USN-3260-2: Firefox regression\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-16091","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16091","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=16091"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16091\/revisions"}],"predecessor-version":[{"id":16092,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/16091\/revisions\/16092"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=16091"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=16091"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=16091"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}