{"id":49921,"date":"2023-02-06T12:30:46","date_gmt":"2023-02-06T03:30:46","guid":{"rendered":"https:\/\/jirak.net\/wp\/usn-5816-2-firefox-regressions\/"},"modified":"2023-02-06T14:34:07","modified_gmt":"2023-02-06T05:34:07","slug":"usn-5816-2-firefox-regressions","status":"publish","type":"post","link":"https:\/\/jirak.net\/wp\/usn-5816-2-firefox-regressions\/","title":{"rendered":"USN-5816-2: Firefox regressions"},"content":{"rendered":"<p>USN-5816-2: Firefox regressions<\/p>\n<p>USN-5816-1 fixed vulnerabilities in Firefox. The update introduced<br \/>\nseveral minor regressions. This update fixes the problem.<\/p>\n<p>We apologize for the inconvenience.<\/p>\n<p>Original advisory details:<\/p>\n<p> Niklas Baumstark discovered that a compromised web child process of Firefox<br \/>\n could disable web security opening restrictions, leading to a new child<br \/>\n process being spawned within the file:\/\/ context. An attacker could<br \/>\n potentially exploits this to obtain sensitive information. (CVE-2023-23597)<\/p>\n<p> Tom Schuster discovered that Firefox was not performing a validation check<br \/>\n on GTK drag data. An attacker could potentially exploits this to obtain<br \/>\n sensitive information. (CVE-2023-23598)<\/p>\n<p> Vadim discovered that Firefox was not properly sanitizing a curl command<br \/>\n output when copying a network request from the developer tools panel. An<br \/>\n attacker could potentially exploits this to hide and execute arbitrary<br \/>\n commands. (CVE-2023-23599)<\/p>\n<p> Luan Herrera discovered that Firefox was not stopping navigation when<br \/>\n dragging a URL from a cross-origin iframe into the same tab. An attacker<br \/>\n potentially exploits this to spoof the user. (CVE-2023-23601)<\/p>\n<p> Dave Vandyke discovered that Firefox did not properly implement CSP policy<br \/>\n when creating a WebSocket in a WebWorker. An attacker who was able to<br \/>\n inject markup into a page otherwise protected by a Content Security Policy<br \/>\n may have been able to inject an executable script. (CVE-2023-23602)<\/p>\n<p> Dan Veditz discovered that Firefox did not properly implement CSP policy<br \/>\n on regular expression when using console.log. An attacker potentially<br \/>\n exploits this to exfiltrate data from the browser. (CVE-2023-23603)<\/p>\n<p> Nika Layzell discovered that Firefox was not performing a validation check<br \/>\n when parsing a non-system html document via DOMParser::ParseFromSafeString.<br \/>\n An attacker potentially exploits this to bypass web security checks.<br \/>\n (CVE-2023-23604)<\/p>\n<p> Multiple security issues were discovered in Firefox. If a user were<br \/>\n tricked into opening a specially crafted website, an attacker could<br \/>\n potentially exploit these to cause a denial of service, obtain sensitive<br \/>\n information across domains, or execute arbitrary code. (CVE-2023-23605,<br \/>\n CVE-2023-23606)<br \/>\nSource: <a href=\"https:\/\/ubuntu.com\/security\/notices\/USN-5816-2\" target=\"_blank\" rel=\"noopener\">USN-5816-2: Firefox regressions<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>USN-5816-2: Firefox regressions USN-5816-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: Niklas Baumstark discovered that a compromised web child process of Firefox could disable web security opening restrictions, leading to a new child process being spawned within the file:\/\/ context. An attacker could potentially exploits this to obtain sensitive information. (CVE-2023-23597) Tom Schuster discovered that Firefox was not performing a validation check on GTK drag data. An attacker could potentially exploits this to obtain sensitive information. (CVE-2023-23598) Vadim discovered that Firefox was not properly sanitizing a curl command output when copying a network request from the developer tools panel. An attacker could potentially exploits this to hide and execute arbitrary commands. (CVE-2023-23599) Luan Herrera discovered that Firefox was not stopping navigation when dragging a <a class=\"mh-excerpt-more\" href=\"https:\/\/jirak.net\/wp\/usn-5816-2-firefox-regressions\/\" title=\"USN-5816-2: Firefox regressions\">[ more&#8230; ]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[586],"tags":[587],"class_list":["post-49921","post","type-post","status-publish","format-standard","hentry","category-ubuntu-usn","tag-ubuntu-usn"],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/49921","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/comments?post=49921"}],"version-history":[{"count":1,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/49921\/revisions"}],"predecessor-version":[{"id":49922,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/posts\/49921\/revisions\/49922"}],"wp:attachment":[{"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/media?parent=49921"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/categories?post=49921"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jirak.net\/wp\/wp-json\/wp\/v2\/tags?post=49921"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}