~ubuntu-security/ubuntu-cve-tracker/master

« back to all changes in this revision

Viewing changes to active/CVE-2018-5181

  • Committer: Steve Beattie
  • Date: 2019-02-19 06:18:27 UTC
  • Revision ID: sbeattie@ubuntu.com-20190219061827-oh57fzcfc1u9dlfk
The ubuntu-cve-tracker project has been converted to git.

Please use 'git clone https://git.launchpad.net/ubuntu-cve-tracker' to
get the converted tree.

Show diffs side-by-side

added added

removed removed

Lines of Context:
1
 
PublicDateAtUSN: 2018-05-11
2
 
Candidate: CVE-2018-5181
3
 
PublicDate: 2018-06-11
4
 
References:
5
 
 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5181
6
 
 https://www.mozilla.org/en-US/security/advisories/mfsa2018-11/#CVE-2018-5181
7
 
 https://usn.ubuntu.com/usn/usn-3645-1
8
 
Description:
9
 
 If a URL using the "file:" protocol is dragged and dropped onto an open tab
10
 
 that is running in a different child process the tab will open a local file
11
 
 corresponding to the dropped URL, contrary to policy. One way to make the
12
 
 target tab open more reliably in a separate process is to open it with the
13
 
 "noopener" keyword. This vulnerability affects Firefox < 60.
14
 
Ubuntu-Description:
15
 
Notes:
16
 
Bugs:
17
 
Priority: medium
18
 
Discovered-by:
19
 
Assigned-to: chrisccoulson
20
 
 
21
 
Patches_firefox:
22
 
upstream_firefox: released (60.0)
23
 
precise/esm_firefox: DNE
24
 
trusty_firefox: released (60.0+build2-0ubuntu0.14.04.1)
25
 
xenial_firefox: released (60.0+build2-0ubuntu0.16.04.1)
26
 
artful_firefox: released (60.0+build2-0ubuntu0.17.10.1)
27
 
bionic_firefox: released (60.0+build2-0ubuntu1)
28
 
devel_firefox: needed