[USN-5816-2] Firefox regressions

Nishit Majithia nishit.majithia at canonical.com
Mon Feb 6 04:43:51 UTC 2023


==========================================================================
Ubuntu Security Notice USN-5816-2
February 06, 2023

firefox regressions
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-5816-1 caused some minor regressions in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-5816-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 Niklas Baumstark discovered that a compromised web child process of Firefox
 could disable web security opening restrictions, leading to a new child
 process being spawned within the file:// context. An attacker could
 potentially exploits this to obtain sensitive information. (CVE-2023-23597)
 
 Tom Schuster discovered that Firefox was not performing a validation check
 on GTK drag data. An attacker could potentially exploits this to obtain
 sensitive information. (CVE-2023-23598)
 
 Vadim discovered that Firefox was not properly sanitizing a curl command
 output when copying a network request from the developer tools panel. An
 attacker could potentially exploits this to hide and execute arbitrary
 commands. (CVE-2023-23599)
 
 Luan Herrera discovered that Firefox was not stopping navigation when
 dragging a URL from a cross-origin iframe into the same tab. An attacker
 potentially exploits this to spoof the user. (CVE-2023-23601)
 
 Dave Vandyke discovered that Firefox did not properly implement CSP policy
 when creating a WebSocket in a WebWorker. An attacker who was able to
 inject markup into a page otherwise protected by a Content Security Policy
 may have been able to inject an executable script. (CVE-2023-23602)
 
 Dan Veditz discovered that Firefox did not properly implement CSP policy
 on regular expression when using console.log. An attacker potentially
 exploits this to exfiltrate data from the browser. (CVE-2023-23603)
 
 Nika Layzell discovered that Firefox was not performing a validation check
 when parsing a non-system html document via DOMParser::ParseFromSafeString.
 An attacker potentially exploits this to bypass web security checks.
 (CVE-2023-23604)
 
 Multiple security issues were discovered in Firefox. If a user were
 tricked into opening a specially crafted website, an attacker could
 potentially exploit these to cause a denial of service, obtain sensitive
 information across domains, or execute arbitrary code. (CVE-2023-23605,
 CVE-2023-23606)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  firefox                         109.0.1+build1-0ubuntu0.20.04.2

Ubuntu 18.04 LTS:
  firefox                         109.0.1+build1-0ubuntu0.18.04.2

After a standard system update you need to restart Firefox to make all the
necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5816-2
  https://ubuntu.com/security/notices/USN-5816-1
  https://launchpad.net/bugs/2006075

Package Information:
  https://launchpad.net/ubuntu/+source/firefox/109.0.1+build1-0ubuntu0.20.04.2
  https://launchpad.net/ubuntu/+source/firefox/109.0.1+build1-0ubuntu0.18.04.2
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 659 bytes
Desc: not available
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20230206/d31086f7/attachment.sig>


More information about the ubuntu-security-announce mailing list