Ubuntu 5782-2: Firefox regressions | LinuxSecurity.com
==========================================================================
Ubuntu Security Notice USN-5782-2
January 05, 2023

firefox regressions
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

USN-5782-1 caused some minor regressions in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

USN-5782-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

 It was discovered that Firefox was using an out-of-date libusrsctp library.
 An attacker could possibly use this library to perform a reentrancy issue
 on Firefox. (CVE-2022-46871)
 
 Nika Layzell discovered that Firefox was not performing a check on paste
 received from cross-processes. An attacker could potentially exploit this
 to obtain sensitive information. (CVE-2022-46872)
 
 Pete Freitag discovered that Firefox did not implement the unsafe-hashes
 CSP directive. An attacker who was able to inject markup into a page
 otherwise protected by a Content Security Policy may have been able to
 inject an executable script. (CVE-2022-46873)
 
 Matthias Zoellner discovered that Firefox was not keeping the filename
 ending intact when using the drag-and-drop event. An attacker could
 possibly use this issue to add a file with a malicious extension, leading
 to execute arbitrary code. (CVE-2022-46874)
 
 Hafiizh discovered that Firefox was not handling fullscreen notifications
 when the browser window goes into fullscreen mode. An attacker could
 possibly use this issue to spoof the user and obtain sensitive information.
 (CVE-2022-46877)
 
 Multiple security issues were discovered in Firefox. If a user were
 tricked into opening a specially crafted website, an attacker could
 potentially exploit these to cause a denial of service, obtain sensitive
 information across domains, or execute arbitrary code. (CVE-2022-46878, 
 CVE-2022-46879)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
  firefox                         108.0.1+build1-0ubuntu0.20.04.1

Ubuntu 18.04 LTS:
  firefox                         108.0.1+build1-0ubuntu0.18.04.1

After a standard system update you need to restart Firefox to make all the
necessary changes.

References:
  https://ubuntu.com/security/notices/USN-5782-2
  https://ubuntu.com/security/notices/USN-5782-1
  https://launchpad.net/bugs/2001921

Package Information:
  https://launchpad.net/ubuntu/+source/firefox/108.0.1+build1-0ubuntu0.20.04.1
  https://launchpad.net/ubuntu/+source/firefox/108.0.1+build1-0ubuntu0.18.04.1

Ubuntu 5782-2: Firefox regressions

January 5, 2023
USN-5782-1 caused some minor regressions in Firefox.

Summary

A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS Summary: USN-5782-1 caused some minor regressions in Firefox. Software Description: - firefox: Mozilla Open Source web browser Details: USN-5782-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem. We apologize for the inconvenience. Original advisory details: It was discovered that Firefox was using an out-of-date libusrsctp library. An attacker could possibly use this library to perform a reentrancy issue on Firefox. (CVE-2022-46871) Nika Layzell discovered that Firefox was not performing a check on paste received from cross-processes. An attacker could potentially exploit this to obtain sensitive information. (CVE-2022-46872) Pete Freitag discovered that Firefox did not implement the unsafe-hashes CSP directive. An attacker who was able to inject markup into a page otherwise protected by a Content Security Policy may have been able to inject an executable script. (CVE-2022-46873) Matthias Zoellner discovered that Firefox was not keeping the filename ending intact when using the drag-and-drop event. An attacker could possibly use this issue to add a file with a malicious extension, leading to execute arbitrary code. (CVE-2022-46874) Hafiizh discovered that Firefox was not handling fullscreen notifications when the browser window goes into fullscreen mode. An attacker could possibly use this issue to spoof the user and obtain sensitive information. (CVE-2022-46877) Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2022-46878, CVE-2022-46879)

Update Instructions

The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: firefox 108.0.1+build1-0ubuntu0.20.04.1 Ubuntu 18.04 LTS: firefox 108.0.1+build1-0ubuntu0.18.04.1 After a standard system update you need to restart Firefox to make all the necessary changes.

References

https://ubuntu.com/security/notices/USN-5782-2

https://ubuntu.com/security/notices/USN-5782-1

https://launchpad.net/bugs/2001921

Severity
Ubuntu Security Notice USN-5782-2

Package Information

https://launchpad.net/ubuntu/+source/firefox/108.0.1+build1-0ubuntu0.20.04.1 https://launchpad.net/ubuntu/+source/firefox/108.0.1+build1-0ubuntu0.18.04.1

We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.