USN-2723-1

Source
https://ubuntu.com/security/notices/USN-2723-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2723-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-2723-1
Upstream
Related
Published
2015-08-27T18:21:35Z
Modified
2026-04-22T09:15:25.257196Z
Summary
firefox vulnerabilities
Details

A use-after-free was discovered when resizing a canvas element during restyling in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4497)

Bas Venis discovered that the addon install permission prompt could be bypassed using data: URLs in some circumstances. It was also discovered that the installation notification could be made to appear over another site. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to install a malicious addon. (CVE-2015-4498)

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@40.0.3+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
40.0.3+build1-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1
37.*
37.0+build2-0ubuntu0.14.04.1
37.0.1+build1-0ubuntu0.14.04.1
37.0.2+build1-0ubuntu0.14.04.1
38.*
38.0+build3-0ubuntu0.14.04.1
39.*
39.0+build5-0ubuntu0.14.04.1
39.0.3+build2-0ubuntu0.14.04.1
40.*
40.0+build4-0ubuntu0.14.04.1
40.0+build4-0ubuntu0.14.04.4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2723-1.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": [
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2015-4497"
        },
        {
            "severity": [
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ],
            "id": "CVE-2015-4498"
        }
    ]
}