Wednesday, March 20, 2024

[USN-6703-1] Firefox vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=wF/3
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-6703-1
March 20, 2024

firefox vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 20.04 LTS

Summary:

Several security issues were fixed in Firefox.

Software Description:
- firefox: Mozilla Open Source web browser

Details:

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2024-2609,
CVE-2024-2611, CVE-2024-2614, CVE-2024-2615)

Hubert Kario discovered that Firefox had a timing side-channel when
performing RSA decryption. A remote attacker could possibly use this
issue to recover sensitive information. (CVE-2023-5388)

It was discovered that Firefox did not properly handle WASM register
values in some circumstances. An attacker could potentially exploit this
issue to cause a denial of service. (CVE-2024-2606)

Gary Kwong discovered that Firefox incorrectly updated return registers
for JIT code on Armv7-A systems. An attacker could potentially exploit
this issue to execute arbitrary code. (CVE-2024-2607)

Ronald Crane discovered that Firefox did not properly manage memory during
character encoding. An attacker could potentially exploit this issue to
cause a denial of service. (CVE-2024-2608)

Georg Felber and Marco Squarcina discovered that Firefox incorrectly
handled html and body tags. An attacker who was able to inject markup into
a page otherwise protected by a Content Security Policy may have been able
obtain sensitive information. (CVE-2024-2610)

Ronald Crane discovered a use-after-free in Firefox when handling code in
SafeRefPtr. An attacker could potentially exploit this issue to cause a
denial of service, or execute arbitrary code. (CVE-2024-2612)

Max Inden discovered that Firefox incorrectly handled QUIC ACK frame
decoding. A attacker could potentially exploit this issue to cause a
denial of service. (CVE-2024-2613)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 20.04 LTS:
firefox 124.0+build1-0ubuntu0.20.04.1

After a standard system update you need to restart Firefox to make all the
necessary changes.

References:
https://ubuntu.com/security/notices/USN-6703-1
CVE-2023-5388, CVE-2024-2606, CVE-2024-2607, CVE-2024-2608,
CVE-2024-2609, CVE-2024-2610, CVE-2024-2611, CVE-2024-2612,
CVE-2024-2613, CVE-2024-2614, CVE-2024-2615

Package Information:
https://launchpad.net/ubuntu/+source/firefox/124.0+build1-0ubuntu0.20.04.1

No comments:

Post a Comment