Wednesday, February 21, 2024

[USN-6649-1] Firefox vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=FryZ
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6649-1
February 22, 2024

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2024-1547,
CVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1553, CVE-2024-1554,
CVE-2024-1555, CVE-2024-1557)

Alfred Peters discovered that Firefox did not properly manage memory when
storing and re-accessing data on a networking channel. An attacker could
potentially exploit this issue to cause a denial of service.
(CVE-2024-1546)

Johan Carlsson discovered that Firefox incorrectly handled Set-Cookie
response headers in multipart HTTP responses. An attacker could
potentially exploit this issue to inject arbitrary cookie values.
(CVE-2024-1551)

Gary Kwong discovered that Firefox incorrectly generated codes on 32-bit
ARM devices, which could lead to unexpected numeric conversions or
undefined behaviour. An attacker could possibly use this issue to cause a
denial of service. (CVE-2024-1552)

Ronald Crane discovered that Firefox did not properly manage memory when
accessing the built-in profiler. An attacker could potentially exploit
this issue to cause a denial of service. (CVE-2024-1556)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
firefox 123.0+build3-0ubuntu0.20.04.1

After a standard system update you need to restart Firefox to make all the
necessary changes.

References:
https://ubuntu.com/security/notices/USN-6649-1
CVE-2024-1546, CVE-2024-1547, CVE-2024-1548, CVE-2024-1549,
CVE-2024-1550, CVE-2024-1551, CVE-2024-1552, CVE-2024-1553,
CVE-2024-1554, CVE-2024-1555, CVE-2024-1556, CVE-2024-1557

Package Information:
https://launchpad.net/ubuntu/+source/firefox/123.0+build3-0ubuntu0.20.04.1

No comments:

Post a Comment