USN-3991-3

Source
https://ubuntu.com/security/notices/USN-3991-3
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3991-3.json
JSON Data
https://api.osv.dev/v1/vulns/USN-3991-3
Published
2019-06-14T20:29:25Z
Modified
2026-04-22T09:55:56.825739Z
Summary
firefox regression
Details

USN-3991-1 fixed vulnerabilities in Firefox, and USN-3991-2 fixed a subsequent regression. The update caused an additional regression that resulted in Firefox failing to load correctly after executing it in safe mode. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Multiple security issues were discovered in Firefox. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, spoof the browser UI, trick the user in to launching local executable binaries, obtain sensitive information, conduct cross-site scripting (XSS) attacks, or execute arbitrary code. (CVE-2019-11691, CVE-2019-11692, CVE-2019-11693, CVE-2019-11695, CVE-2019-11696, CVE-2019-11699, CVE-2019-11701, CVE-2019-7317, CVE-2019-9800, CVE-2019-9814, CVE-2019-9817, CVE-2019-9819, CVE-2019-9820, CVE-2019-9821)

It was discovered that pressing certain key combinations could bypass addon installation prompt delays. If a user opened a specially crafted website, an attacker could potentially exploit this to trick them in to installing a malicious extension. (CVE-2019-11697)

It was discovered that history data could be exposed via drag and drop of hyperlinks to and from bookmarks. If a user were tricked in to dragging a specially crafted hyperlink to the bookmark toolbar or sidebar, and subsequently back in to the web content area, an attacker could potentially exploit this to obtain sensitive information. (CVE-2019-11698)

A type confusion bug was discovered with object groups and UnboxedObjects. If a user were tricked in to opening a specially crafted website after enabling the UnboxedObjects feature, an attacker could potentially exploit this to bypass security checks. (CVE-2019-9816)

References

Affected packages

Ubuntu:16.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@67.0.2+build2-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
67.0.2+build2-0ubuntu0.16.04.1

Affected versions

41.*
41.0.2+build2-0ubuntu1
42.*
42.0+build2-0ubuntu1
44.*
44.0+build3-0ubuntu2
44.0.1+build1-0ubuntu1
44.0.2+build1-0ubuntu1
45.*
45.0+build2-0ubuntu1
45.0.1+build1-0ubuntu1
45.0.2+build1-0ubuntu1
46.*
46.0+build5-0ubuntu0.16.04.2
46.0.1+build1-0ubuntu0.16.04.2
47.*
47.0+build3-0ubuntu0.16.04.1
48.*
48.0+build2-0ubuntu0.16.04.1
49.*
49.0+build4-0ubuntu0.16.04.1
49.0.2+build2-0ubuntu0.16.04.2
50.*
50.0+build2-0ubuntu0.16.04.2
50.0.2+build1-0ubuntu0.16.04.1
50.1.0+build2-0ubuntu0.16.04.1
51.*
51.0.1+build2-0ubuntu0.16.04.1
51.0.1+build2-0ubuntu0.16.04.2
52.*
52.0+build2-0ubuntu0.16.04.1
52.0.1+build2-0ubuntu0.16.04.1
52.0.2+build1-0ubuntu0.16.04.1
53.*
53.0+build6-0ubuntu0.16.04.1
53.0.2+build1-0ubuntu0.16.04.2
53.0.3+build1-0ubuntu0.16.04.2
54.*
54.0+build3-0ubuntu0.16.04.1
55.*
55.0.1+build2-0ubuntu0.16.04.2
55.0.2+build1-0ubuntu0.16.04.1
56.*
56.0+build6-0ubuntu0.16.04.1
56.0+build6-0ubuntu0.16.04.2
57.*
57.0+build4-0ubuntu0.16.04.5
57.0+build4-0ubuntu0.16.04.6
57.0.1+build2-0ubuntu0.16.04.1
57.0.3+build1-0ubuntu0.16.04.1
57.0.4+build1-0ubuntu0.16.04.1
58.*
58.0+build6-0ubuntu0.16.04.1
58.0.1+build1-0ubuntu0.16.04.1
58.0.2+build1-0ubuntu0.16.04.1
59.*
59.0+build5-0ubuntu0.16.04.1
59.0.1+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.3
60.*
60.0+build2-0ubuntu0.16.04.1
60.0.1+build2-0ubuntu0.16.04.1
60.0.2+build1-0ubuntu0.16.04.1
61.*
61.0+build3-0ubuntu0.16.04.2
61.0.1+build1-0ubuntu0.16.04.1
62.*
62.0+build2-0ubuntu0.16.04.3
62.0+build2-0ubuntu0.16.04.4
62.0+build2-0ubuntu0.16.04.5
62.0.3+build1-0ubuntu0.16.04.2
63.*
63.0+build2-0ubuntu0.16.04.2
63.0.3+build1-0ubuntu0.16.04.1
64.*
64.0+build3-0ubuntu0.16.04.1
65.*
65.0+build2-0ubuntu0.16.04.1
65.0.1+build2-0ubuntu0.16.04.1
66.*
66.0+build3-0ubuntu0.16.04.2
66.0.1+build1-0ubuntu0.16.04.1
66.0.2+build1-0ubuntu0.16.04.1
66.0.3+build1-0ubuntu0.16.04.1
66.0.4+build3-0ubuntu0.16.04.1
66.0.5+build1-0ubuntu0.16.04.1
67.*
67.0+build2-0ubuntu0.16.04.1
67.0.1+build1-0ubuntu0.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "67.0.2+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.16.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3991-3.json"
cves_map
{
    "ecosystem": "Ubuntu:16.04:LTS",
    "cves": []
}

Ubuntu:18.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@67.0.2+build2-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
67.0.2+build2-0ubuntu0.18.04.1

Affected versions

56.*
56.0+build6-0ubuntu1
57.*
57.0.1+build2-0ubuntu1
59.*
59.0.1+build1-0ubuntu1
59.0.2+build1-0ubuntu1
60.*
60.0+build2-0ubuntu1
60.0.1+build2-0ubuntu0.18.04.1
60.0.2+build1-0ubuntu0.18.04.1
61.*
61.0+build3-0ubuntu0.18.04.1
61.0.1+build1-0ubuntu0.18.04.1
62.*
62.0+build2-0ubuntu0.18.04.3
62.0+build2-0ubuntu0.18.04.4
62.0+build2-0ubuntu0.18.04.5
62.0.3+build1-0ubuntu0.18.04.1
63.*
63.0+build2-0ubuntu0.18.04.2
63.0.3+build1-0ubuntu0.18.04.1
64.*
64.0+build3-0ubuntu0.18.04.1
65.*
65.0+build2-0ubuntu0.18.04.1
65.0.1+build2-0ubuntu0.18.04.1
66.*
66.0+build3-0ubuntu0.18.04.1
66.0.1+build1-0ubuntu0.18.04.1
66.0.2+build1-0ubuntu0.18.04.1
66.0.3+build1-0ubuntu0.18.04.1
66.0.4+build3-0ubuntu0.18.04.1
66.0.5+build1-0ubuntu0.18.04.1
67.*
67.0+build2-0ubuntu0.18.04.1
67.0.1+build1-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "67.0.2+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-globalmenu"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-mozsymbols"
        },
        {
            "binary_version": "67.0.2+build2-0ubuntu0.18.04.1",
            "binary_name": "firefox-testsuite"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-3991-3.json"
cves_map
{
    "ecosystem": "Ubuntu:18.04:LTS",
    "cves": []
}