This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============1511725458390350583== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------tWX9C1K2qLWwK0cLE0XTR07t"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------tWX9C1K2qLWwK0cLE0XTR07t Content-Type: multipart/mixed; boundary="------------1rteznITeH9UGkmY33VKUnDX"; protected-headers="v1" From: Evan Caville <evan.caville@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <f2527829-df57-43ac-8a5e-f971c98ec4f0@canonical.com> Subject: [USN-7263-1] Firefox vulnerabilities
--------------1rteznITeH9UGkmY33VKUnDX Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7263-1 February 11, 2025
firefox vulnerabilities ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Several security issues were fixed in Firefox.
Software Description: - firefox: Mozilla Open Source web browser
Details:
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to cause a denial of service, obtain sensitive information across domains, or execute arbitrary code. (CVE-2025-1011, CVE-2025-1013, CVE-2025-1014, CVE-2025-1016, CVE-2025-1017, CVE-2025-1018, CVE-2025-1019, CVE-2025-1020)
Ivan Fratric discovered that Firefox did not properly handle XSLT data, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1009)
Atte Kettunen discovered that Firefox did not properly manage memory in the Custom Highlight API, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1010)
Nils Bars discovered that Firefox did not properly manage memory during concurrent delazification, leading to a use-after-free vulnerability. An attacker could potentially exploit this issue to cause a denial of service, or execute arbitrary code. (CVE-2025-1012)
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 20.04 LTS firefox 135.0+build2-0ubuntu0.20.04.1
After a standard system update you need to restart Firefox to make all the necessary changes
References: https://ubuntu.com/security/notices/USN-7263-1 CVE-2025-1009, CVE-2025-1010, CVE-2025-1011, CVE-2025-1012, CVE-2025-1013, CVE-2025-1014, CVE-2025-1016, CVE-2025-1017, CVE-2025-1018, CVE-2025-1019, CVE-2025-1020
Package Information: https://launchpad.net/ubuntu/+source/firefox/135.0+build2-0ubuntu0.20.04.1
--------------1rteznITeH9UGkmY33VKUnDX--
--------------tWX9C1K2qLWwK0cLE0XTR07t Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsF5BAABCAAjFiEEAPYWTpwtIbr7xH4OWNrRIKaTkWcFAmeqyD8FAwAAAAAACgkQWNrRIKaTkWe4 ZQ//S/uS0s/Jk7S+6lEPcsDAMiDmrurcSc/pMs5t7Uly5UJV6CuWzor1qKteZRMjX4Ts2Ra52C9Y Bgt/GLNEpqPYNBShKk3gZGW/LCP7Y2Z0WCu1JroHcGxT1R7hr03xtoijFCXkz0WhgGu3D9Ebs7kW inzzJWAwOsTdUvLe6CSoyAPZRZVPaotEgMZpUcZYuqzyGr2kVUaJrLs5xKQYFvG0vw5jfHYUP27c VYbIE5lV1F2WZfpr8SfYJEk6Lac6UHxqZ/2+zqVuIx+isVcjjr2IsYrWXF/D2V/HLfPTzqq0Y9wh 6/niefFEQk5KYvjOG7I6B7UJVxqGxQAc8LPUUHQ50w+CHBg50JhPMJbTeCxmPQa6hEr2AxZEeYZE v/yQIE18UmofbqTkEOt9mQgmyd6hsAkfXQYYk/v1nDoOUlZ/dOnFioa9q0MBD7zsSsvWIHehu+04 8OD8iDZ0kcnUI+N6Ur4LSx+2FcsFi8IgOCdl4sFPQozlpdNfHSRB7epXxXCWtokQO7PYK3/pW8Yo rWW6BACvT4X3HhBNCEJ2ZZqACfURQK5fsup3hNngBBs3XzNTJyuBC3+MXJs8IVz277p46E3/DN4M /He6fpQi3EREs8qyf/p5ISZUNmNoqSPT4ldSvYZZ2q66x/3tpdvF/hhuIK66qe79w30HvhK84ClH flk= =c3hA -----END PGP SIGNATURE-----
--------------tWX9C1K2qLWwK0cLE0XTR07t--
--===============1511725458390350583== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============1511725458390350583==--
|