LinuxQuestions.org
Welcome to the most active Linux Forum on the web.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware
User Name
Password
Slackware This Forum is for the discussion of Slackware Linux.

Notices


Reply
  Search this Thread
Old 08-07-2015, 12:26 AM   #421
mancha
Member
 
Registered: Aug 2012
Posts: 484

Original Poster
Rep: Reputation: Disabled

Update 20150807 UTC

  1. Mozilla Firefox

    A flaw was discovered in Firefox that permits the violation of same origin policy and injection of script into a non-privileged part
    of the built-in PDF viewer. This allows an attacker to read and steal sensitive local files on a victim's computer. (CVE-2015-4495)

    Mozilla has received numerous reports of active exploitation in the wild.

    Recommendation: Slackware users should upgrade to Firefox 39.0.3, asap.

    Note: Slackware 14.1 ships FF ESR 31 which has EOL'd in favor of FF ESR 38. Slackware 14.1 users who wish to remain on the
    ESR track should upgrade to ESR 38.1.1 to address this flaw. Alternatively, they can use ruario's script (see earlier posts for
    instructions) to install Mozilla's build of 39.0.3.

--mancha

Last edited by mancha; 08-07-2015 at 01:37 AM.
 
1 members found this post helpful.
Old 08-07-2015, 05:11 AM   #422
j_v
Member
 
Registered: Oct 2011
Distribution: Slackware64
Posts: 364

Rep: Reputation: 67
I've just built and upgraded to 38.1.1esr. Be aware that there are changes in how this firefox handles profiles. I highly recommend backing up the .mozilla folder before starting the newly installed firefox. I've already needed the back up for restoring some of my preferences.
 
1 members found this post helpful.
Old 08-07-2015, 11:44 AM   #423
mancha
Member
 
Registered: Aug 2012
Posts: 484

Original Poster
Rep: Reputation: Disabled
Update

Regarding the Firefox flaw (CVE-2015-4495) I report above, Mozilla published a blog entry that briefly describes one exploit found in
the wild that uses this vulnerability to steal files from Windows and Linux systems and uploads them to what appears to be a machine
in Ukraine.

They recommend changing passwords/keys in certain files targeted by that particular exploit. I would err on the side of caution and
expand the recommendation to include all password/keys accessible by the Firefox process.

--mancha
 
3 members found this post helpful.
Old 08-07-2015, 12:09 PM   #424
ponce
LQ Guru
 
Registered: Aug 2004
Location: Pisa, Italy
Distribution: Slackware
Posts: 7,097

Rep: Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174Reputation: 4174
thanks for the heads-up, mancha: a reason more to keep using adblock and noscript extensions.
 
Old 08-07-2015, 02:11 PM   #425
j_v
Member
 
Registered: Oct 2011
Distribution: Slackware64
Posts: 364

Rep: Reputation: 67
It's weird, that CVE number comes up as reserved at http://cve.mitre.org/cgi-bin/cvename...=CVE-2015-4495.
But a search for the exploit here https://web.nvd.nist.gov/view/vuln/s...execution=e2s1
brings up https://web.nvd.nist.gov/view/vuln/d...=CVE-2015-2743.

Is this perhaps the syntax change that mitre.org is describing?
 
Old 08-07-2015, 03:00 PM   #426
slalik
Member
 
Registered: Nov 2014
Location: Moscow
Distribution: Slackware
Posts: 233

Rep: Reputation: 203Reputation: 203Reputation: 203
CVE-2015-4495 is very impressive :-(. Does it mean that Firefox users must update all certificates, ssh, gpg keys etc.?
 
Old 08-07-2015, 11:23 PM   #427
cwizardone
LQ Veteran
 
Registered: Feb 2007
Distribution: Slackware64-current with "True Multilib" and KDE4Town.
Posts: 9,097

Rep: Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275Reputation: 7275
Quote:
Originally Posted by mancha View Post
Update

Regarding the Firefox flaw (CVE-2015-4495) I report above, Mozilla published a blog entry that briefly describes one exploit found in
the wild that uses this vulnerability to steal files from Windows and Linux systems and uploads them to what appears to be a machine
in Ukraine.

They recommend changing passwords/keys in certain files targeted by that particular exploit. I would err on the side of caution and
expand the recommendation to include all password/keys accessible by the Firefox process.

--mancha
Mancha,
Where does that leave users of SeaMonkey, which hasn't been updated since March?
Thanks.
 
Old 08-07-2015, 11:49 PM   #428
MadMaverick9
Member
 
Registered: Aug 2010
Posts: 353
Blog Entries: 4

Rep: Reputation: Disabled
Uh ... just disable the builtin pdf viewer in firefox?!?!?!?!

Set "pdfjs.disabled" to true in "about:config".

mupdf and evince do not have javascript builtin.

From the mupdf slackbuild:
Code:
MUJS="${MUJS:-no}"
 
1 members found this post helpful.
Old 08-08-2015, 12:01 AM   #429
MadMaverick9
Member
 
Registered: Aug 2010
Posts: 353
Blog Entries: 4

Rep: Reputation: Disabled
Quote:
Originally Posted by cwizardone View Post
Mancha,
Where does that leave users of SeaMonkey, which hasn't been updated since March?
Thanks.
From reading this [@mozillazine.org] it seems that Seamonkey does not have the pdf viewer built in. It needs to be explicitly installed.
 
1 members found this post helpful.
Old 08-08-2015, 02:17 AM   #430
drgibbon
Senior Member
 
Registered: Nov 2014
Distribution: Slackware64 15.0
Posts: 1,220

Rep: Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942
Quote:
Originally Posted by ponce View Post
thanks for the heads-up, mancha: a reason more to keep using adblock and noscript extensions.
You could also firejail the Firefox process, and when run with the default profile
Code:
firejail --profile=/etc/firejail/firefox.profile --caps firefox
it blocks process access to the user's config directories for gpg, kwallet, gnome keyring, and a few other things. You can add your own directories to block, and although it uses a blacklist system, it works. Firejail tutorial for Firefox here.
 
2 members found this post helpful.
Old 08-08-2015, 08:47 AM   #431
1337_powerslacker
Member
 
Registered: Nov 2009
Location: Kansas, USA
Distribution: Slackware64-15.0
Posts: 862
Blog Entries: 9

Rep: Reputation: 592Reputation: 592Reputation: 592Reputation: 592Reputation: 592Reputation: 592
Quote:
Originally Posted by drgibbon View Post
You could also firejail the Firefox process, and when run with the default profile
Code:
firejail --profile=/etc/firejail/firefox.profile --caps firefox
it blocks process access to the user's config directories for gpg, kwallet, gnome keyring, and a few other things. You can add your own directories to block, and although it uses a blacklist system, it works. Firejail tutorial for Firefox here.
drgibbon, thanks for the heads-up about firejail! It is most useful in this day and age where every application and its cousin has to have some kind of access to the Internet.
 
Old 08-08-2015, 11:29 AM   #432
j_v
Member
 
Registered: Oct 2011
Distribution: Slackware64
Posts: 364

Rep: Reputation: 67
Just as a heads up, firejail is available at SBo http://slackbuilds.org/repository/14.1/system/firejail/
I'm going to try it after I post this.

EDIT: the version in the SlackBuild is a bit old, but substituting the newer version (0.9.28) in the script, it builds without errors.

POST EDIT: running a simple instance of
Code:
firejail firefox
right now. I need to read up more about and utilize firejail's options, but initial impression is that it doesn't break anything yet and I hardly notice it there. Thanks for the pointer to this, drgibbon.

LAST EDIT: I noticed that if you try to start firefox jailed by firejail and you already have an instance of firefox running unjailed, firejail will close and the new firefox is attaching (this is a guess) to the existing firefox process. If you ensure that the first firefox is firejail'd, then it seems that new firefox windows get immediated jailed (another guess, will try to debug to be sure). The dev for firejail seems to be very active and very responsive, so I am encouraged about this.

Last edited by j_v; 08-08-2015 at 12:10 PM.
 
Old 08-08-2015, 12:57 PM   #433
j_v
Member
 
Registered: Oct 2011
Distribution: Slackware64
Posts: 364

Rep: Reputation: 67
Updates for ca-certificates, mozilla-nss, mozilla-firefox have been released for both 14.1 and current.
 
Old 08-08-2015, 01:33 PM   #434
slalik
Member
 
Registered: Nov 2014
Location: Moscow
Distribution: Slackware
Posts: 233

Rep: Reputation: 203Reputation: 203Reputation: 203
What is better approach, firejail or running firefox under a different user like "Skype with a grain of salt"?
 
Old 08-08-2015, 06:59 PM   #435
drgibbon
Senior Member
 
Registered: Nov 2014
Distribution: Slackware64 15.0
Posts: 1,220

Rep: Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942Reputation: 942
Quote:
Originally Posted by j_v View Post
POST EDIT: running a simple instance of
Code:
firejail firefox
right now.
For some reason that didn't work for me, I had to explicitly load the Firefox profile from the command line as above. I tested it by adding:
Code:
blacklist {HOME}/documents
to /etc/firejail/firefox.profile and it was only when supplying the profile to the firejail call that access to ~/documents was denied (by Ctrl-O and browsing to ~/documents in Firefox), but YMMV.
 
  


Reply

Tags
exploit, security, slackware



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[Slackware Security]: Some pending vulnerabilities... mancha Slackware 7 08-22-2013 09:08 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Distributions > Slackware

All times are GMT -5. The time now is 10:30 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration