USN-2538-1: Firefox vulnerabilities

Publication date

22 March 2015

Overview

Firefox could be made to crash or run programs as your login if it opened a malicious website.


Packages

  • firefox - Mozilla Open Source web browser

Details

A flaw was discovered in the implementation of typed array bounds checking
in the Javascript just-in-time compilation. If a user were tricked in to
opening a specially crafted website, an attacked could exploit this to
execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-0817)

Mariusz Mlynski discovered a flaw in the processing of SVG format content
navigation. If a user were tricked in to opening a specially crafted
website, an attacker could exploit this to run arbitrary script in a
privileged context. (CVE-2015-0818)

A flaw was discovered in the implementation of typed array bounds checking
in the Javascript just-in-time compilation. If a user were tricked in to
opening a specially crafted website, an attacked could exploit this to
execute arbitrary code with the privileges of the user invoking Firefox.
(CVE-2015-0817)

Mariusz Mlynski discovered a flaw in the processing of SVG format content
navigation. If a user were tricked in to opening a specially crafted
website, an attacker could exploit this to run arbitrary script in a
privileged context. (CVE-2015-0818)

Update instructions

After a standard system update you need to restart Firefox to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
14.10 utopic firefox –  36.0.4+build1-0ubuntu0.14.10.1
14.04 trusty firefox –  36.0.4+build1-0ubuntu0.14.04.1
12.04 precise firefox –  36.0.4+build1-0ubuntu0.12.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›