A use-after-free was discovered when resizing a canvas element during restyling in some circumstances. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via application crash, or execute arbitrary code with the privileges of the user invoking Firefox. (CVE-2015-4497)
Bas Venis discovered that the addon install permission prompt could be bypassed using data: URLs in some circumstances. It was also discovered that the installation notification could be made to appear over another site. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to install a malicious addon. (CVE-2015-4498)
{
"binaries": [
{
"binary_name": "firefox",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-globalmenu",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-mozsymbols",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
},
{
"binary_name": "firefox-testsuite",
"binary_version": "40.0.3+build1-0ubuntu0.14.04.1"
}
],
"availability": "No subscription required"
}
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-2723-1.json"
{
"ecosystem": "Ubuntu:14.04:LTS",
"cves": [
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2015-4497"
},
{
"severity": [
{
"type": "Ubuntu",
"score": "medium"
}
],
"id": "CVE-2015-4498"
}
]
}