Lucene search

K
ubuntuUbuntuUSN-5816-2
HistoryFeb 06, 2023 - 12:00 a.m.

Firefox regressions

2023-02-0600:00:00
ubuntu.com
38

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0 Low

EPSS

Percentile

38.0%

Releases

  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 ESM

Packages

  • firefox - Mozilla Open Source web browser

Details

USN-5816-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Niklas Baumstark discovered that a compromised web child process of Firefox
could disable web security opening restrictions, leading to a new child
process being spawned within the file:// context. An attacker could
potentially exploits this to obtain sensitive information. (CVE-2023-23597)

Tom Schuster discovered that Firefox was not performing a validation check
on GTK drag data. An attacker could potentially exploits this to obtain
sensitive information. (CVE-2023-23598)

Vadim discovered that Firefox was not properly sanitizing a curl command
output when copying a network request from the developer tools panel. An
attacker could potentially exploits this to hide and execute arbitrary
commands. (CVE-2023-23599)

Luan Herrera discovered that Firefox was not stopping navigation when
dragging a URL from a cross-origin iframe into the same tab. An attacker
potentially exploits this to spoof the user. (CVE-2023-23601)

Dave Vandyke discovered that Firefox did not properly implement CSP policy
when creating a WebSocket in a WebWorker. An attacker who was able to
inject markup into a page otherwise protected by a Content Security Policy
may have been able to inject an executable script. (CVE-2023-23602)

Dan Veditz discovered that Firefox did not properly implement CSP policy
on regular expression when using console.log. An attacker potentially
exploits this to exfiltrate data from the browser. (CVE-2023-23603)

Nika Layzell discovered that Firefox was not performing a validation check
when parsing a non-system html document via DOMParser::ParseFromSafeString.
An attacker potentially exploits this to bypass web security checks.
(CVE-2023-23604)

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-23605,
CVE-2023-23606)

OSVersionArchitecturePackageVersionFilename
Ubuntu20.04noarchfirefox< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-dbg< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-dev< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-geckodriver< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-af< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-an< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-ar< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-as< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-ast< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Ubuntu20.04noarchfirefox-locale-az< 109.0.1+build1-0ubuntu0.20.04.2UNKNOWN
Rows per page:
1-10 of 1961

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

9.8 High

AI Score

Confidence

High

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0 Low

EPSS

Percentile

38.0%