Lucene search

K
ubuntuUbuntuUSN-5816-2
HistoryFeb 06, 2023 - 12:00 a.m.

Firefox regressions

2023-02-0600:00:00
ubuntu.com
48
ubuntu 20.04 lts
ubuntu 18.04 esm
mozilla open source
vulnerabilities
compromised web process
gtk drag data
curl command
navigation spoof
csp policy
regular expression
security issues
denial of service

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%

Releases

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • firefox - Mozilla Open Source web browser

Details

USN-5816-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Niklas Baumstark discovered that a compromised web child process of Firefox
could disable web security opening restrictions, leading to a new child
process being spawned within the file:// context. An attacker could
potentially exploits this to obtain sensitive information. (CVE-2023-23597)

Tom Schuster discovered that Firefox was not performing a validation check
on GTK drag data. An attacker could potentially exploits this to obtain
sensitive information. (CVE-2023-23598)

Vadim discovered that Firefox was not properly sanitizing a curl command
output when copying a network request from the developer tools panel. An
attacker could potentially exploits this to hide and execute arbitrary
commands. (CVE-2023-23599)

Luan Herrera discovered that Firefox was not stopping navigation when
dragging a URL from a cross-origin iframe into the same tab. An attacker
potentially exploits this to spoof the user. (CVE-2023-23601)

Dave Vandyke discovered that Firefox did not properly implement CSP policy
when creating a WebSocket in a WebWorker. An attacker who was able to
inject markup into a page otherwise protected by a Content Security Policy
may have been able to inject an executable script. (CVE-2023-23602)

Dan Veditz discovered that Firefox did not properly implement CSP policy
on regular expression when using console.log. An attacker potentially
exploits this to exfiltrate data from the browser. (CVE-2023-23603)

Nika Layzell discovered that Firefox was not performing a validation check
when parsing a non-system html document via DOMParser::ParseFromSafeString.
An attacker potentially exploits this to bypass web security checks.
(CVE-2023-23604)

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-23605,
CVE-2023-23606)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchfirefox< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-dbg< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-dev< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-geckodriver< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-af< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-an< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-ar< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-as< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-ast< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-az< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Rows per page:
1-10 of 1961

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

65.0%