USN-3645-2

Source
https://ubuntu.com/security/notices/USN-3645-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3645-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3645-2
Published
2018-05-18T20:55:00Z
Modified
2026-02-10T04:41:20Z
Summary
firefox regression
Details

USN-3645-1 fixed vulnerabilities in Firefox. The update caused an issue where users experienced long UI pauses in some circumsances. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service via application crash, bypass same-origin restrictions, conduct cross-site scripting (XSS) attacks, install lightweight themes without user interaction, spoof the filename in the downloads panel, or execute arbitrary code. (CVE-2018-5150, CVE-2018-5151, CVE-2018-5153, CVE-2018-5154, CVE-2018-5155, CVE-2018-5157, CVE-2018-5158, CVE-2018-5159, CVE-2018-5160, CVE-2018-5163, CVE-2018-5164, CVE-2018-5168, CVE-2018-5173, CVE-2018-5175, CVE-2018-5177, CVE-2018-5180)

Multiple security issues were discovered with WebExtensions. If a user were tricked in to installing a specially crafted extension, an attacker could potentially exploit these to obtain sensitive information, or bypass security restrictions. (CVE-2018-5152, CVE-2018-5166)

It was discovered that the web console and JavaScript debugger incorrectly linkified chrome: and javascript URLs. If a user were tricked in to clicking a specially crafted link, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5167)

It was discovered that dragging and dropping link text on to the home button could set the home page to include chrome pages. If a user were tricked in to dragging and dropping a specially crafted link on to the home button, an attacker could potentially exploit this bypass security restrictions. (CVE-2018-5169)

It was discovered that the Live Bookmarks page and PDF viewer would run script pasted from the clipboard. If a user were tricked in to copying and pasting specially crafted text, an attacker could potentially exploit this to conduct cross-site scripting (XSS) attacks. (CVE-2018-5172)

It was discovered that the JSON viewer incorrectly linkified javascript: URLs. If a user were tricked in to clicking on a specially crafted link, an attacker could potentially exploit this to obtain sensitive information. (CVE-2018-5176)

It was discovered that dragging a file: URL on to a tab that is running in a different process would cause the file to open in that process. If a user were tricked in to dragging a file: URL, an attacker could potentially exploit this to bypass intended security policies. (CVE-2018-5181)

It was discovered that dragging text that is a file: URL on to the addressbar would open the specified file. If a user were tricked in to dragging specially crafted text on to the addressbar, an attacker could potentially exploit this to bypass intended security policies. (CVE-2018-5182)

References

Affected packages

Ubuntu:14.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@60.0.1+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
60.0.1+build2-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1
37.*
37.0+build2-0ubuntu0.14.04.1
37.0.1+build1-0ubuntu0.14.04.1
37.0.2+build1-0ubuntu0.14.04.1
38.*
38.0+build3-0ubuntu0.14.04.1
39.*
39.0+build5-0ubuntu0.14.04.1
39.0.3+build2-0ubuntu0.14.04.1
40.*
40.0+build4-0ubuntu0.14.04.1
40.0+build4-0ubuntu0.14.04.4
40.0.3+build1-0ubuntu0.14.04.1
41.*
41.0+build3-0ubuntu0.14.04.1
41.0.1+build2-0ubuntu0.14.04.1
41.0.2+build2-0ubuntu0.14.04.1
42.*
42.0+build2-0ubuntu0.14.04.1
43.*
43.0+build1-0ubuntu0.14.04.1
43.0.4+build3-0ubuntu0.14.04.1
44.*
44.0+build3-0ubuntu0.14.04.1
44.0.1+build2-0ubuntu0.14.04.1
44.0.2+build1-0ubuntu0.14.04.1
45.*
45.0+build2-0ubuntu0.14.04.1
45.0.1+build1-0ubuntu0.14.04.2
45.0.2+build1-0ubuntu0.14.04.1
46.*
46.0+build5-0ubuntu0.14.04.2
46.0.1+build1-0ubuntu0.14.04.3
47.*
47.0+build3-0ubuntu0.14.04.1
48.*
48.0+build2-0ubuntu0.14.04.1
49.*
49.0+build4-0ubuntu0.14.04.1
49.0.2+build2-0ubuntu0.14.04.1
50.*
50.0+build2-0ubuntu0.14.04.2
50.0.2+build1-0ubuntu0.14.04.1
50.1.0+build2-0ubuntu0.14.04.1
51.*
51.0.1+build2-0ubuntu0.14.04.1
51.0.1+build2-0ubuntu0.14.04.2
52.*
52.0+build2-0ubuntu0.14.04.1
52.0.1+build2-0ubuntu0.14.04.1
52.0.2+build1-0ubuntu0.14.04.1
53.*
53.0+build6-0ubuntu0.14.04.1
53.0.2+build1-0ubuntu0.14.04.2
53.0.3+build1-0ubuntu0.14.04.2
54.*
54.0+build3-0ubuntu0.14.04.1
55.*
55.0.1+build2-0ubuntu0.14.04.2
55.0.2+build1-0ubuntu0.14.04.1
56.*
56.0+build6-0ubuntu0.14.04.1
56.0+build6-0ubuntu0.14.04.2
57.*
57.0+build4-0ubuntu0.14.04.4
57.0+build4-0ubuntu0.14.04.5
57.0.1+build2-0ubuntu0.14.04.1
57.0.3+build1-0ubuntu0.14.04.1
57.0.4+build1-0ubuntu0.14.04.1
58.*
58.0+build6-0ubuntu0.14.04.1
58.0.1+build1-0ubuntu0.14.04.1
58.0.2+build1-0ubuntu0.14.04.1
59.*
59.0+build5-0ubuntu0.14.04.1
59.0.1+build1-0ubuntu0.14.04.1
59.0.2+build1-0ubuntu0.14.04.1
59.0.2+build1-0ubuntu0.14.04.4
60.*
60.0+build2-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "60.0.1+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.14.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3645-2.json"
cves_map
{
    "ecosystem": "Ubuntu:14.04:LTS",
    "cves": []
}

Ubuntu:16.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@60.0.1+build2-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
60.0.1+build2-0ubuntu0.16.04.1

Affected versions

41.*
41.0.2+build2-0ubuntu1
42.*
42.0+build2-0ubuntu1
44.*
44.0+build3-0ubuntu2
44.0.1+build1-0ubuntu1
44.0.2+build1-0ubuntu1
45.*
45.0+build2-0ubuntu1
45.0.1+build1-0ubuntu1
45.0.2+build1-0ubuntu1
46.*
46.0+build5-0ubuntu0.16.04.2
46.0.1+build1-0ubuntu0.16.04.2
47.*
47.0+build3-0ubuntu0.16.04.1
48.*
48.0+build2-0ubuntu0.16.04.1
49.*
49.0+build4-0ubuntu0.16.04.1
49.0.2+build2-0ubuntu0.16.04.2
50.*
50.0+build2-0ubuntu0.16.04.2
50.0.2+build1-0ubuntu0.16.04.1
50.1.0+build2-0ubuntu0.16.04.1
51.*
51.0.1+build2-0ubuntu0.16.04.1
51.0.1+build2-0ubuntu0.16.04.2
52.*
52.0+build2-0ubuntu0.16.04.1
52.0.1+build2-0ubuntu0.16.04.1
52.0.2+build1-0ubuntu0.16.04.1
53.*
53.0+build6-0ubuntu0.16.04.1
53.0.2+build1-0ubuntu0.16.04.2
53.0.3+build1-0ubuntu0.16.04.2
54.*
54.0+build3-0ubuntu0.16.04.1
55.*
55.0.1+build2-0ubuntu0.16.04.2
55.0.2+build1-0ubuntu0.16.04.1
56.*
56.0+build6-0ubuntu0.16.04.1
56.0+build6-0ubuntu0.16.04.2
57.*
57.0+build4-0ubuntu0.16.04.5
57.0+build4-0ubuntu0.16.04.6
57.0.1+build2-0ubuntu0.16.04.1
57.0.3+build1-0ubuntu0.16.04.1
57.0.4+build1-0ubuntu0.16.04.1
58.*
58.0+build6-0ubuntu0.16.04.1
58.0.1+build1-0ubuntu0.16.04.1
58.0.2+build1-0ubuntu0.16.04.1
59.*
59.0+build5-0ubuntu0.16.04.1
59.0.1+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.3
60.*
60.0+build2-0ubuntu0.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "60.0.1+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3645-2.json"
cves_map
{
    "ecosystem": "Ubuntu:16.04:LTS",
    "cves": []
}

Ubuntu:18.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@60.0.1+build2-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
60.0.1+build2-0ubuntu0.18.04.1

Affected versions

56.*
56.0+build6-0ubuntu1
57.*
57.0.1+build2-0ubuntu1
59.*
59.0.1+build1-0ubuntu1
59.0.2+build1-0ubuntu1
60.*
60.0+build2-0ubuntu1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "60.0.1+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "60.0.1+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3645-2.json"
cves_map
{
    "ecosystem": "Ubuntu:18.04:LTS",
    "cves": []
}