|
|
Subscribe / Log in / New account

Ubuntu alert USN-7263-1 (firefox)

From:  Evan Caville <evan.caville@canonical.com>
To:  ubuntu-security-announce@lists.ubuntu.com
Subject:  [USN-7263-1] Firefox vulnerabilities
Date:  Tue, 11 Feb 2025 13:47:10 +1000
Message-ID:  <f2527829-df57-43ac-8a5e-f971c98ec4f0@canonical.com>

========================================================================== Ubuntu Security Notice USN-7263-1 February 11, 2025 firefox vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: Several security issues were fixed in Firefox. Software Description: - firefox: Mozilla Open Source web browser Details: Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2025-1011, CVE-2025-1013, CVE-2025-1014, CVE-2025-1016, CVE-2025-1017, CVE-2025-1018, CVE-2025-1019, CVE-2025-1020) Ivan Fratric discovered that Firefox did not properly handle XSLT data, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1009) Atte Kettunen discovered that Firefox did not properly manage memory in the Custom Highlight API, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1010) Nils Bars discovered that Firefox did not properly manage memory during concurrent delazification, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1012) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS   firefox                         135.0+build2-0ubuntu0.20.04.1 After a standard system update you need to restart Firefox to make all the necessary changes References:   https://ubuntu.com/security/notices/USN-7263-1   CVE-2025-1009, CVE-2025-1010, CVE-2025-1011, CVE-2025-1012,   CVE-2025-1013, CVE-2025-1014, CVE-2025-1016, CVE-2025-1017,   CVE-2025-1018, CVE-2025-1019, CVE-2025-1020 Package Information: https://launchpad.net/ubuntu/+source/firefox/135.0+build2...


Attachment: OpenPGP_signature.asc (type=application/pgp-signature)

-----BEGIN PGP SIGNATURE----- wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmeqyD8FAwAAAAAACgkQWNrRIKaTkWe4 ZQ//S/uS0s/Jk7S+6lEPcsDAMiDmrurcSc/pMs5t7Uly5UJV6CuWzor1qKteZRMjX4Ts2Ra52C9Y Bgt/GLNEpqPYNBShKk3gZGW/LCP7Y2Z0WCu1JroHcGxT1R7hr03xtoijFCXkz0WhgGu3D9Ebs7kW inzzJWAwOsTdUvLe6CSoyAPZRZVPaotEgMZpUcZYuqzyGr2kVUaJrLs5xKQYFvG0vw5jfHYUP27c VYbIE5lV1F2WZfpr8SfYJEk6Lac6UHxqZ/2+zqVuIx+isVcjjr2IsYrWXF/D2V/HLfPTzqq0Y9wh 6/niefFEQk5KYvjOG7I6B7UJVxqGxQAc8LPUUHQ50w+CHBg50JhPMJbTeCxmPQa6hEr2AxZEeYZE v/yQIE18UmofbqTkEOt9mQgmyd6hsAkfXQYYk/v1nDoOUlZ/dOnFioa9q0MBD7zsSsvWIHehu+04 8OD8iDZ0kcnUI+N6Ur4LSx+2FcsFi8IgOCdl4sFPQozlpdNfHSRB7epXxXCWtokQO7PYK3/pW8Yo rWW6BACvT4X3HhBNCEJ2ZZqACfURQK5fsup3hNngBBs3XzNTJyuBC3+MXJs8IVz277p46E3/DN4M /He6fpQi3EREs8qyf/p5ISZUNmNoqSPT4ldSvYZZ2q66x/3tpdvF/hhuIK66qe79w30HvhK84ClH flk= =c3hA -----END PGP SIGNATURE-----


Attachment: None (type=text/plain)


to post comments


Copyright © 2025, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds