USN-5880-2

Source
https://ubuntu.com/security/notices/USN-5880-2
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5880-2.json
JSON Data
https://api.osv.dev/v1/vulns/USN-5880-2
Published
2023-03-01T07:00:04Z
Modified
2026-04-22T10:32:09.180542Z
Summary
firefox regressions
Details

USN-5880-1 fixed vulnerabilities in Firefox. The update introduced several minor regressions. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

Christian Holler discovered that Firefox did not properly manage memory when using PKCS 12 Safe Bag attributes. An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes. (CVE-2023-0767)

Johan Carlsson discovered that Firefox did not properly manage child iframe's unredacted URI when using Content-Security-Policy-Report-Only header. An attacker could potentially exploits this to obtain sensitive information. (CVE-2023-25728)

Vitor Torres discovered that Firefox did not properly manage permissions of extensions interaction via ExpandedPrincipals. An attacker could potentially exploits this issue to download malicious files or execute arbitrary code. (CVE-2023-25729)

Irvan Kurniawan discovered that Firefox did not properly validate background script invoking requestFullscreen. An attacker could potentially exploit this issue to perform spoofing attacks. (CVE-2023-25730)

Ronald Crane discovered that Firefox did not properly manage memory when using EncodeInputStream in xpcom. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25732)

Samuel Grob discovered that Firefox did not properly manage memory when using wrappers wrapping a scripted proxy. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25735)

Holger Fuhrmannek discovered that Firefox did not properly manage memory when using Module load requests. An attacker could potentially exploits this issue to cause a denial of service. (CVE-2023-25739)

Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2023-25731, CVE-2023-25733, CVE-2023-25736, CVE-2023-25737, CVE-2023-25741, CVE-2023-25742, CVE-2023-25744, CVE-2023-25745)

References

Affected packages

Ubuntu:18.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@110.0.1+build2-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
110.0.1+build2-0ubuntu0.18.04.1

Affected versions

56.*
56.0+build6-0ubuntu1
57.*
57.0.1+build2-0ubuntu1
59.*
59.0.1+build1-0ubuntu1
59.0.2+build1-0ubuntu1
60.*
60.0+build2-0ubuntu1
60.0.1+build2-0ubuntu0.18.04.1
60.0.2+build1-0ubuntu0.18.04.1
61.*
61.0+build3-0ubuntu0.18.04.1
61.0.1+build1-0ubuntu0.18.04.1
62.*
62.0+build2-0ubuntu0.18.04.3
62.0+build2-0ubuntu0.18.04.4
62.0+build2-0ubuntu0.18.04.5
62.0.3+build1-0ubuntu0.18.04.1
63.*
63.0+build2-0ubuntu0.18.04.2
63.0.3+build1-0ubuntu0.18.04.1
64.*
64.0+build3-0ubuntu0.18.04.1
65.*
65.0+build2-0ubuntu0.18.04.1
65.0.1+build2-0ubuntu0.18.04.1
66.*
66.0+build3-0ubuntu0.18.04.1
66.0.1+build1-0ubuntu0.18.04.1
66.0.2+build1-0ubuntu0.18.04.1
66.0.3+build1-0ubuntu0.18.04.1
66.0.4+build3-0ubuntu0.18.04.1
66.0.5+build1-0ubuntu0.18.04.1
67.*
67.0+build2-0ubuntu0.18.04.1
67.0.1+build1-0ubuntu0.18.04.1
67.0.2+build2-0ubuntu0.18.04.1
67.0.3+build1-0ubuntu0.18.04.1
67.0.4+build1-0ubuntu0.18.04.1
68.*
68.0+build3-0ubuntu0.18.04.1
68.0.1+build1-0ubuntu0.18.04.1
68.0.2+build1-0ubuntu0.18.04.1
69.*
69.0+build2-0ubuntu0.18.04.1
69.0.1+build1-0ubuntu0.18.04.1
69.0.2+build1-0ubuntu0.18.04.1
70.*
70.0+build2-0ubuntu0.18.04.1
70.0.1+build1-0ubuntu0.18.04.1
71.*
71.0+build5-0ubuntu0.18.04.1
72.*
72.0.1+build1-0ubuntu0.18.04.1
72.0.2+build1-0ubuntu0.18.04.1
73.*
73.0+build3-0ubuntu0.18.04.1
73.0.1+build1-0ubuntu0.18.04.1
74.*
74.0+build3-0ubuntu0.18.04.1
74.0.1+build1-0ubuntu0.18.04.1
75.*
75.0+build3-0ubuntu0.18.04.1
76.*
76.0+build2-0ubuntu0.18.04.1
76.0.1+build1-0ubuntu0.18.04.1
77.*
77.0.1+build1-0ubuntu0.18.04.1
78.*
78.0.1+build1-0ubuntu0.18.04.1
78.0.2+build2-0ubuntu0.18.04.1
79.*
79.0+build1-0ubuntu0.18.04.1
80.*
80.0+build2-0ubuntu0.18.04.1
80.0.1+build1-0ubuntu0.18.04.1
81.*
81.0+build2-0ubuntu0.18.04.1
81.0.2+build1-0ubuntu0.18.04.1
82.*
82.0+build2-0ubuntu0.18.04.1
82.0.2+build1-0ubuntu0.18.04.1
82.0.3+build1-0ubuntu0.18.04.1
83.*
83.0+build2-0ubuntu0.18.04.2
84.*
84.0+build3-0ubuntu0.18.04.1
84.0.1+build1-0ubuntu0.18.04.1
84.0.2+build1-0ubuntu0.18.04.1
85.*
85.0+build1-0ubuntu0.18.04.1
85.0.1+build1-0ubuntu0.18.04.1
86.*
86.0+build3-0ubuntu0.18.04.1
86.0.1+build1-0ubuntu0.18.04.1
87.*
87.0+build3-0ubuntu0.18.04.2
88.*
88.0+build2-0ubuntu0.18.04.2
88.0.1+build1-0ubuntu0.18.04.2
89.*
89.0+build2-0ubuntu0.18.04.2
89.0.1+build1-0ubuntu0.18.04.1
89.0.2+build1-0ubuntu0.18.04.1
90.*
90.0+build1-0ubuntu0.18.04.1
90.0.2+build1-0ubuntu0.18.04.1
91.*
91.0+build2-0ubuntu0.18.04.1
91.0.1+build1-0ubuntu0.18.04.1
91.0.2+build1-0ubuntu0.18.04.1
92.*
92.0+build3-0ubuntu0.18.04.1
93.*
93.0+build1-0ubuntu0.18.04.1
94.*
94.0+build3-0ubuntu0.18.04.1
95.*
95.0+build1-0ubuntu0.18.04.1
95.0.1+build2-0ubuntu0.18.04.1
96.*
96.0+build2-0ubuntu0.18.04.1
97.*
97.0+build2-0ubuntu0.18.04.1
97.0.2+build1-0ubuntu0.18.04.1
98.*
98.0+build3-0ubuntu0.18.04.2
98.0.1+build2-0ubuntu0.18.04.1
98.0.2+build1-0ubuntu0.18.04.1
99.*
99.0+build2-0ubuntu0.18.04.2
100.*
100.0+build2-0ubuntu0.18.04.1
100.0.2+build1-0ubuntu0.18.04.1
101.*
101.0.1+build1-0ubuntu0.18.04.1
102.*
102.0+build2-0ubuntu0.18.04.1
103.*
103.0+build1-0ubuntu0.18.04.1
104.*
104.0+build3-0ubuntu0.18.04.1
105.*
105.0+build2-0ubuntu0.18.04.1
106.*
106.0.2+build1-0ubuntu0.18.04.1
106.0.5+build1-0ubuntu0.18.04.1
107.*
107.0+build2-0ubuntu0.18.04.1
108.*
108.0+build2-0ubuntu0.18.04.1
108.0.1+build1-0ubuntu0.18.04.1
108.0.2+build1-0ubuntu0.18.04.1
109.*
109.0+build2-0ubuntu0.18.04.1
109.0.1+build1-0ubuntu0.18.04.2
110.*
110.0+build3-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "110.0.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-geckodriver",
            "binary_version": "110.0.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "110.0.1+build2-0ubuntu0.18.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:18.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5880-2.json"

Ubuntu:20.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@110.0.1+build2-0ubuntu0.20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
110.0.1+build2-0ubuntu0.20.04.1

Affected versions

69.*
69.0.3+build1-0ubuntu1
70.*
70.0+build2-0ubuntu1
70.0+build2-0ubuntu2
70.0.1+build1-0ubuntu2
71.*
71.0+build2-0ubuntu2
71.0+build5-0ubuntu1
72.*
72.0.1+build1-0ubuntu1
72.0.2+build1-0ubuntu1
73.*
73.0+build1-0ubuntu1
73.0+build2-0ubuntu1
73.0+build3-0ubuntu1
73.0.1+build1-0ubuntu1
74.*
74.0+build1-0ubuntu1
74.0+build2-0ubuntu1
74.0+build2-0ubuntu2
74.0+build3-0ubuntu1
75.*
75.0+build3-0ubuntu1
76.*
76.0+build2-0ubuntu0.20.04.1
76.0.1+build1-0ubuntu0.20.04.1
77.*
77.0.1+build1-0ubuntu0.20.04.1
78.*
78.0.1+build1-0ubuntu0.20.04.1
78.0.2+build2-0ubuntu0.20.04.1
79.*
79.0+build1-0ubuntu0.20.04.1
80.*
80.0+build2-0ubuntu0.20.04.1
80.0.1+build1-0ubuntu0.20.04.1
81.*
81.0+build2-0ubuntu0.20.04.1
81.0.2+build1-0ubuntu0.20.04.1
82.*
82.0+build2-0ubuntu0.20.04.1
82.0.2+build1-0ubuntu0.20.04.1
82.0.3+build1-0ubuntu0.20.04.1
83.*
83.0+build2-0ubuntu0.20.04.1
84.*
84.0+build3-0ubuntu0.20.04.1
84.0.1+build1-0ubuntu0.20.04.1
84.0.2+build1-0ubuntu0.20.04.1
85.*
85.0+build1-0ubuntu0.20.04.1
85.0.1+build1-0ubuntu0.20.04.1
86.*
86.0+build3-0ubuntu0.20.04.1
86.0.1+build1-0ubuntu0.20.04.1
87.*
87.0+build3-0ubuntu0.20.04.2
88.*
88.0+build2-0ubuntu0.20.04.1
88.0.1+build1-0ubuntu0.20.04.2
89.*
89.0+build2-0ubuntu0.20.04.2
89.0.1+build1-0ubuntu0.20.04.1
89.0.2+build1-0ubuntu0.20.04.1
90.*
90.0+build1-0ubuntu0.20.04.1
90.0.2+build1-0ubuntu0.20.04.1
91.*
91.0+build2-0ubuntu0.20.04.1
91.0.1+build1-0ubuntu0.20.04.1
91.0.2+build1-0ubuntu0.20.04.1
92.*
92.0+build3-0ubuntu0.20.04.1
93.*
93.0+build1-0ubuntu0.20.04.1
94.*
94.0+build3-0ubuntu0.20.04.1
95.*
95.0+build1-0ubuntu0.20.04.1
95.0.1+build2-0ubuntu0.20.04.1
96.*
96.0+build2-0ubuntu0.20.04.1
97.*
97.0+build2-0ubuntu0.20.04.1
97.0.2+build1-0ubuntu0.20.04.1
98.*
98.0+build3-0ubuntu0.20.04.2
98.0.1+build2-0ubuntu0.20.04.1
98.0.2+build1-0ubuntu0.20.04.1
99.*
99.0+build2-0ubuntu0.20.04.2
100.*
100.0+build2-0ubuntu0.20.04.1
100.0.2+build1-0ubuntu0.20.04.1
101.*
101.0.1+build1-0ubuntu0.20.04.1
102.*
102.0+build2-0ubuntu0.20.04.1
103.*
103.0+build1-0ubuntu0.20.04.1
104.*
104.0+build3-0ubuntu0.20.04.1
105.*
105.0+build2-0ubuntu0.20.04.1
106.*
106.0.2+build1-0ubuntu0.20.04.1
106.0.5+build1-0ubuntu0.20.04.1
107.*
107.0+build2-0ubuntu0.20.04.1
108.*
108.0+build2-0ubuntu0.20.04.1
108.0.1+build1-0ubuntu0.20.04.1
108.0.2+build1-0ubuntu0.20.04.1
109.*
109.0+build2-0ubuntu0.20.04.1
109.0.1+build1-0ubuntu0.20.04.2
110.*
110.0+build3-0ubuntu0.20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "110.0.1+build2-0ubuntu0.20.04.1"
        },
        {
            "binary_name": "firefox-geckodriver",
            "binary_version": "110.0.1+build2-0ubuntu0.20.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "110.0.1+build2-0ubuntu0.20.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

cves_map
{
    "cves": [],
    "ecosystem": "Ubuntu:20.04:LTS"
}
source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-5880-2.json"