Home / mailings [USN-2743-3] Unity Integration for Firefox, Unity Websites
Posted on 24 September 2015
Ubuntu Security==========================
==========================
========================
Ubuntu Security Notice USN-2743-3
September 24, 2015
unity-firefox-extension, webapps-greasemonkey, webaccounts-browser-extens=
ion update
==========================
==========================
========================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 15.04
- Ubuntu 14.04 LTS
Summary:
This update provides compatible packages for Firefox 41
Software Description:
- unity-firefox-extension: Unity Integration for Firefox
- webaccounts-browser-extension: Ubuntu Online Accounts extension for chr=
omium
- webapps-greasemonkey: Firefox extension: Website Integration
Details:
USN-2743-1 fixed vulnerabilities in Firefox. Future Firefox updates will
require all addons be signed and unity-firefox-extension, webapps-greasem=
onkey
and webaccounts-browser-extension will not go through the signing process=
=2E
Because these addons currently break search engine installations (LP:
#1069793), this update permanently disables the addons by removing them f=
rom
the system.
We apologize for any inconvenience.
Original advisory details:
Andrew Osmond, Olli Pettay, Andrew Sutherland, Christian Holler, David
Major, Andrew McCreight, Cameron McCormack, Bob Clary and Randell Jesup
discovered multiple memory safety issues in Firefox. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service via application
crash, or execute arbitrary code with the privileges of the user invokin=
g
Firefox. (CVE-2015-4500, CVE-2015-4501)
=20
Andr=E9 Bargull discovered that when a web page creates a scripted proxy=
for the window with a handler defined a certain way, a reference to the
inner window will be passed, rather than that of the outer window.
(CVE-2015-4502)
=20
Felix Gr=F6bert discovered an out-of-bounds read in the QCMS color
management library in some circumstances. If a user were tricked in to
opening a specially crafted website, an attacker could potentially explo=
it
this to cause a denial of service via application crash, or obtain
sensitive information. (CVE-2015-4504)
=20
Khalil Zhani discovered a buffer overflow when parsing VP9 content in so=
me
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of=
service via application crash, or execute arbitrary code with the
privileges of the user invoking Firefox. (CVE-2015-4506)
=20
Spandan Veggalam discovered a crash while using the debugger API in some=
circumstances. If a user were tricked in to opening a specially crafted
website whilst using the debugger, an attacker could potentially exploit=
this to execute arbitrary code with the privileges of the user invoking
Firefox. (CVE-2015-4507)
=20
Juho Nurminen discovered that the URL bar could display the wrong URL in=
reader mode in some circumstances. If a user were tricked in to opening =
a
specially crafted website, an attacker could potentially exploit this to=
conduct URL spoofing attacks. (CVE-2015-4508)
=20
A use-after-free was discovered when manipulating HTML media content in
some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to cause a
denial of service via application crash, or execute arbitrary code with
the privileges of the user invoking Firefox. (CVE-2015-4509)
=20
Looben Yang discovered a use-after-free when using a shared worker with
IndexedDB in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to=
cause a denial of service via application crash, or execute arbitrary co=
de
with the privileges of the user invoking Firefox. (CVE-2015-4510)
=20
Francisco Alonso discovered an out-of-bounds read during 2D canvas
rendering in some circumstances. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to=
obtain sensitive information. (CVE-2015-4512)
=20
Jeff Walden discovered that changes could be made to immutable propertie=
s
in some circumstances. If a user were tricked in to opening a specially
crafted website, an attacker could potentially exploit this to execute
arbitrary script in a privileged scope. (CVE-2015-4516)
=20
Ronald Crane reported multiple vulnerabilities. If a user were tricked i=
n
to opening a specially crafted website, an attacker could potentially
exploit these to cause a denial of service via application crash, or
execute arbitrary code with the privileges of the user invoking Firefox.=
(CVE-2015-4517, CVE-2015-4521, CVE-2015-4522, CVE-2015-7174,
CVE-2015-7175, CVE-2015-7176, CVE-2015-7177, CVE-2015-7180)
=20
Mario Gomes discovered that dragging and dropping an image after a
redirect exposes the redirected URL to scripts. An attacker could
potentially exploit this to obtain sensitive information. (CVE-2015-4519=
)
=20
Ehsan Akhgari discovered 2 issues with CORS preflight requests. An
attacker could potentially exploit these to bypass CORS restrictions.
(CVE-2015-4520)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 15.04:
xul-ext-unity 3.0.0+14.04.20140416-0ubuntu1.15.04.1
xul-ext-webaccounts 0.5-0ubuntu4.15.04.1
xul-ext-websites-integration 2.3.6+14.10.20140701-0ubuntu1.15.04.1
Ubuntu 14.04 LTS:
xul-ext-unity 3.0.0+14.04.20140416-0ubuntu1.14.04.1
xul-ext-webaccounts 0.5-0ubuntu2.14.04.1
xul-ext-websites-integration 2.3.6+13.10.20130920.1-0ubuntu1.2
After a standard system update you need to restart Firefox to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-2743-3
http://www.ubuntu.com/usn/usn-2743-1
https://launchpad.net/bugs/1069793, https://launchpad.net/bugs/1498681
Package Information:
https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.0=
4.20140416-0ubuntu1.15.04.1
https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-=
0ubuntu4.15.04.1
https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+14.10.2=
0140701-0ubuntu1.15.04.1
https://launchpad.net/ubuntu/+source/unity-firefox-extension/3.0.0+14.0=
4.20140416-0ubuntu1.14.04.1
https://launchpad.net/ubuntu/+source/webaccounts-browser-extension/0.5-=
0ubuntu2.14.04.1
https://launchpad.net/ubuntu/+source/webapps-greasemonkey/2.3.6+13.10.2=
0130920.1-0ubuntu1.2