修復:關於一個繞開沙盒的漏洞
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/
https://www.mozilla.org/en-US/firefox/67.0.4/releasenotes/
Insufficient vetting of parameters passed with the Prompt:Open IPC message between child and parent processes can result in the non-sandboxed parent process opening web content chosen by a compromised child process. When combined with additional vulnerabilities this could result in executing arbitrary code on the user's computer.
https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/
https://www.mozilla.org/en-US/firefox/67.0.4/releasenotes/