Ubuntu 6578 Published by

The following updates has been released for Ubuntu Linux:

USN-3918-3: Firefox regression
USN-3925-1: FreeImage vulnerability
USN-3927-1: Thunderbird vulnerabilities



USN-3918-3: Firefox regression

==========================================================================
Ubuntu Security Notice USN-3918-3
March 28, 2019

firefox regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

USN-3918-1 caused a regression in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-3918-1 fixed vulnerabilities in Firefox. The update caused web
compatibility issues with some websites. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Multiple security issues were discovered in Firefox. If a user were
 tricked in to opening a specially crafted website, an attacker could
 potentially exploit these to cause a denial of service via application
 crash, denial of service via successive FTP authorization prompts or modal
 alerts, trick the user with confusing permission request prompts, obtain
 sensitive information, conduct social engineering attacks, or execute
 arbitrary code. (CVE-2019-9788, CVE-2019-9789, CVE-2019-9790,
 CVE-2019-9791, CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9797,
 CVE-2019-9799, CVE-2019-9802, CVE-2019-9805, CVE-2019-9806, CVE-2019-9807,
 CVE-2019-9808, CVE-2019-9809)
 
 A mechanism was discovered that removes some bounds checking for string,
 array, or typed array accesses if Spectre mitigations have been disabled.
 If a user were tricked in to opening a specially crafted website with
 Spectre mitigations disabled, an attacker could potentially exploit this
 to cause a denial of service, or execute arbitrary code. (CVE-2019-9793)
 
 It was discovered that Upgrade-Insecure-Requests was incorrectly enforced
 for same-origin navigation. An attacker could potentially exploit this to
 conduct man-in-the-middle (MITM) attacks. (CVE-2019-9803)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
  firefox  66.0.2+build1-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
  firefox  66.0.2+build1-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
  firefox  66.0.2+build1-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  firefox 66.0.2+build1-0ubuntu0.14.04.1

After a standard system update you need to restart Firefox to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3918-3
  https://usn.ubuntu.com/usn/usn-3918-1
  https://launchpad.net/bugs/1822185

Package Information:
 
https://launchpad.net/ubuntu/+source/firefox/66.0.2+build1-0ubuntu0.18.10.1
 
https://launchpad.net/ubuntu/+source/firefox/66.0.2+build1-0ubuntu0.18.04.1
 
https://launchpad.net/ubuntu/+source/firefox/66.0.2+build1-0ubuntu0.16.04.1
 
https://launchpad.net/ubuntu/+source/firefox/66.0.2+build1-0ubuntu0.14.04.1


USN-3925-1: FreeImage vulnerability

==========================================================================
Ubuntu Security Notice USN-3925-1
March 28, 2019

freeimage vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

FreeImage could be made to crash or run programs as your login if it
opened a specially crafted file.

Software Description:
- freeimage: Support library for graphics image formats (development files)

Details:

It was discovered that an out-of-bounds write vulnerability existed in the XMP
Image handling functionality of the FreeImage library. If a user or automated
system were tricked into opening a specially crafted image, a remote attacker
could overwrite arbitrary memory, resultin in code execution.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 16.04 LTS:
libfreeimage3 3.17.0+ds1-2ubuntu0.1
libfreeimageplus3 3.17.0+ds1-2ubuntu0.1

Ubuntu 14.04 LTS:
libfreeimage3 3.15.4-3ubuntu0.1

In general, a standard system update will make all the necessary changes.

References:
https://usn.ubuntu.com/usn/usn-3925-1
CVE-2016-5684

Package Information:
https://launchpad.net/ubuntu/+source/freeimage/3.17.0+ds1-2ubuntu0.1
https://launchpad.net/ubuntu/+source/freeimage/3.15.4-3ubuntu0.1

USN-3927-1: Thunderbird vulnerabilities

==========================================================================
Ubuntu Security Notice USN-3927-1
March 28, 2019

thunderbird vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 18.10
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in Thunderbird.

Software Description:
- thunderbird: Mozilla Open Source mail and newsgroup client

Details:

It was discovered that Thunderbird allowed PAC files to specify that
requests to localhost are sent through the proxy to another server. If
proxy auto-detection is enabled, an attacker could potentially exploit
this to conduct attacks on local services and tools. (CVE-2018-18506)

Multiple security issues were discovered in Thunderbird. If a user were
tricked in to opening a specially crafted website in a browsing context,
an attacker could potentially exploit these to cause a denial of service,
or execute arbitrary code. (CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
CVE-2019-9792, CVE-2019-9795, CVE-2019-9796, CVE-2019-9810, CVE-2019-9813)

A mechanism was discovered that removes some bounds checking for string,
array, or typed array accesses if Spectre mitigations have been disabled.
If a user were tricked in to opening a specially crafted website in a
browsing context with Spectre mitigations disabled, an attacker could
potentially exploit this to cause a denial of service, or execute
arbitrary code. (CVE-2019-9793)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 18.10:
  thunderbird  1:60.6.1+build2-0ubuntu0.18.10.1

Ubuntu 18.04 LTS:
  thunderbird  1:60.6.1+build2-0ubuntu0.18.04.1

Ubuntu 16.04 LTS:
  thunderbird  1:60.6.1+build2-0ubuntu0.16.04.1

Ubuntu 14.04 LTS:
  thunderbird  1:60.6.1+build2-0ubuntu0.14.04.1

After a standard system update you need to restart Thunderbird to make
all the necessary changes.

References:
  https://usn.ubuntu.com/usn/usn-3927-1
  CVE-2018-18506, CVE-2019-9788, CVE-2019-9790, CVE-2019-9791,
  CVE-2019-9792, CVE-2019-9793, CVE-2019-9795, CVE-2019-9796,
  CVE-2019-9810, CVE-2019-9813

Package Information:
 
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.18.10.1
 
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.18.04.1
 
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.16.04.1
 
https://launchpad.net/ubuntu/+source/thunderbird/1:60.6.1+build2-0ubuntu0.14.04.1