UBUNTU-CVE-2017-5426

Source
https://ubuntu.com/security/CVE-2017-5426
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5426.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-5426
Upstream
  • CVE-2017-5426
Downstream
Related
Published
2017-03-07T00:00:00Z
Modified
2026-02-04T02:41:07.203771Z
Severity
  • 5.3 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

On Linux, if the secure computing mode BPF (seccomp-bpf) filter is running when the Gecko Media Plugin sandbox is started, the sandbox fails to be applied and items that would run within the sandbox are run protected only by the running filter which is typically weak compared to the sandbox. Note: this issue only affects Linux. Other operating systems are not affected. This vulnerability affects Firefox < 52 and Thunderbird < 52.

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@52.0+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.0+build2-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1
37.*
37.0+build2-0ubuntu0.14.04.1
37.0.1+build1-0ubuntu0.14.04.1
37.0.2+build1-0ubuntu0.14.04.1
38.*
38.0+build3-0ubuntu0.14.04.1
39.*
39.0+build5-0ubuntu0.14.04.1
39.0.3+build2-0ubuntu0.14.04.1
40.*
40.0+build4-0ubuntu0.14.04.1
40.0+build4-0ubuntu0.14.04.4
40.0.3+build1-0ubuntu0.14.04.1
41.*
41.0+build3-0ubuntu0.14.04.1
41.0.1+build2-0ubuntu0.14.04.1
41.0.2+build2-0ubuntu0.14.04.1
42.*
42.0+build2-0ubuntu0.14.04.1
43.*
43.0+build1-0ubuntu0.14.04.1
43.0.4+build3-0ubuntu0.14.04.1
44.*
44.0+build3-0ubuntu0.14.04.1
44.0.1+build2-0ubuntu0.14.04.1
44.0.2+build1-0ubuntu0.14.04.1
45.*
45.0+build2-0ubuntu0.14.04.1
45.0.1+build1-0ubuntu0.14.04.2
45.0.2+build1-0ubuntu0.14.04.1
46.*
46.0+build5-0ubuntu0.14.04.2
46.0.1+build1-0ubuntu0.14.04.3
47.*
47.0+build3-0ubuntu0.14.04.1
48.*
48.0+build2-0ubuntu0.14.04.1
49.*
49.0+build4-0ubuntu0.14.04.1
49.0.2+build2-0ubuntu0.14.04.1
50.*
50.0+build2-0ubuntu0.14.04.2
50.0.2+build1-0ubuntu0.14.04.1
50.1.0+build2-0ubuntu0.14.04.1
51.*
51.0.1+build2-0ubuntu0.14.04.1
51.0.1+build2-0ubuntu0.14.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "52.0+build2-0ubuntu0.14.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5426.json"

Ubuntu:16.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@52.0+build2-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
52.0+build2-0ubuntu0.16.04.1

Affected versions

41.*
41.0.2+build2-0ubuntu1
42.*
42.0+build2-0ubuntu1
44.*
44.0+build3-0ubuntu2
44.0.1+build1-0ubuntu1
44.0.2+build1-0ubuntu1
45.*
45.0+build2-0ubuntu1
45.0.1+build1-0ubuntu1
45.0.2+build1-0ubuntu1
46.*
46.0+build5-0ubuntu0.16.04.2
46.0.1+build1-0ubuntu0.16.04.2
47.*
47.0+build3-0ubuntu0.16.04.1
48.*
48.0+build2-0ubuntu0.16.04.1
49.*
49.0+build4-0ubuntu0.16.04.1
49.0.2+build2-0ubuntu0.16.04.2
50.*
50.0+build2-0ubuntu0.16.04.2
50.0.2+build1-0ubuntu0.16.04.1
50.1.0+build2-0ubuntu0.16.04.1
51.*
51.0.1+build2-0ubuntu0.16.04.1
51.0.1+build2-0ubuntu0.16.04.2

Ecosystem specific

{
    "availability": "No subscription required",
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "52.0+build2-0ubuntu0.16.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5426.json"