First published: Fri Jan 05 2018(Updated: )
It was discovered that speculative execution performed by modern CPUs could leak information through a timing side-channel attack, and that this could be exploited in web browser JavaScript engines. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to obtain sensitive information from other domains, bypassing same-origin restrictions. (CVE-2017-5715, CVE-2017-5753, CVE-2017-5754).
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/firefox | <57.0.4+build1-0ubuntu0.17.10.1 | 57.0.4+build1-0ubuntu0.17.10.1 |
=17.10 | ||
All of | ||
ubuntu/firefox | <57.0.4+build1-0ubuntu0.17.04.1 | 57.0.4+build1-0ubuntu0.17.04.1 |
=17.04 | ||
All of | ||
ubuntu/firefox | <57.0.4+build1-0ubuntu0.16.04.1 | 57.0.4+build1-0ubuntu0.16.04.1 |
=16.04 | ||
All of | ||
ubuntu/firefox | <57.0.4+build1-0ubuntu0.14.04.1 | 57.0.4+build1-0ubuntu0.14.04.1 |
=14.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The vulnerability ID for this Firefox vulnerability is USN-3516-1.
The severity of USN-3516-1 is not specified in the provided information.
This vulnerability can be exploited by tricking a user into opening a specially crafted website.
Software versions 57.0.4+build1-0ubuntu0.17.10.1, 57.0.4+build1-0ubuntu0.17.04.1, 57.0.4+build1-0ubuntu0.16.04.1, and 57.0.4+build1-0ubuntu0.14.04.1 are affected by USN-3516-1.
To fix USN-3516-1, update Firefox to version 57.0.4+build1-0ubuntu0.17.10.1, 57.0.4+build1-0ubuntu0.17.04.1, 57.0.4+build1-0ubuntu0.16.04.1, or 57.0.4+build1-0ubuntu0.14.04.1.