USN-3516-1: Firefox vulnerabilities

Publication date

5 January 2018

Overview

Firefox could be made to expose sensitive information.


Packages

  • firefox - Mozilla Open Source web browser

Details

It was discovered that speculative execution performed by modern CPUs
could leak information through a timing side-channel attack, and that
this could be exploited in web browser JavaScript engines. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information from other
domains, bypassing same-origin restrictions. (CVE-2017-5715,
CVE-2017-5753, CVE-2017-5754).

It was discovered that speculative execution performed by modern CPUs
could leak information through a timing side-channel attack, and that
this could be exploited in web browser JavaScript engines. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to obtain sensitive information from other
domains, bypassing same-origin restrictions. (CVE-2017-5715,
CVE-2017-5753, CVE-2017-5754).

Update instructions

After a standard system update you need to restart Firefox to make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
17.10 artful firefox –  57.0.4+build1-0ubuntu0.17.10.1
17.04 zesty firefox –  57.0.4+build1-0ubuntu0.17.04.1
16.04 xenial firefox –  57.0.4+build1-0ubuntu0.16.04.1
14.04 trusty firefox –  57.0.4+build1-0ubuntu0.14.04.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›