[USN-7078-1] Firefox vulnerability
[USN-7080-1] Unbound vulnerability
[USN-7079-1] WebKitGTK vulnerabilities
[USN-7078-1] Firefox vulnerability
=========================================================================
Ubuntu Security Notice USN-7078-1
October 22, 2024
firefox vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
Summary:
Firefox could be made to crash or run programs as your login
Software Description:
- firefox: Mozilla Open Source web browser
Details:
Atte Kettunen discovered that Firefox did not properly validate before
inserting ranges into the selection node cache. An attacker could possibly
use this issue to cause a denial of service or execute arbitrary code.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
firefox 131.0.3+build1-0ubuntu0.20.04.1
After a standard system update you need to restart Firefox to make all the
necessary changes.
References:
https://ubuntu.com/security/notices/USN-7078-1
CVE-2024-9936
Package Information:
https://launchpad.net/ubuntu/+source/firefox/131.0.3+build1-0ubuntu0.20.04.1
[USN-7080-1] Unbound vulnerability
==========================================================================
Ubuntu Security Notice USN-7080-1
October 22, 2024
unbound vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Unbound could be made to stop responding if it received specially crafted
DNS traffic.
Software Description:
- unbound: validating, recursive, caching DNS resolver
Details:
Toshifumi Sakaguchi discovered that Unbound incorrectly handled name
compression for large RRsets, which could lead to excessive CPU usage.
An attacker could potentially use this issue to cause a denial of service
by sending specially crafted DNS responses.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
libunbound8 1.20.0-1ubuntu2.1
unbound 1.20.0-1ubuntu2.1
Ubuntu 24.04 LTS
libunbound8 1.19.2-1ubuntu3.3
unbound 1.19.2-1ubuntu3.3
Ubuntu 22.04 LTS
libunbound8 1.13.1-1ubuntu5.8
unbound 1.13.1-1ubuntu5.8
Ubuntu 20.04 LTS
libunbound8 1.9.4-2ubuntu1.9
unbound 1.9.4-2ubuntu1.9
Ubuntu 18.04 LTS
libunbound2 1.6.7-1ubuntu2.6+esm3
Available with Ubuntu Pro
unbound 1.6.7-1ubuntu2.6+esm3
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libunbound2 1.5.8-1ubuntu1.1+esm2
Available with Ubuntu Pro
unbound 1.5.8-1ubuntu1.1+esm2
Available with Ubuntu Pro
Ubuntu 14.04 LTS
libunbound2 1.4.22-1ubuntu4.14.04.3+esm2
Available with Ubuntu Pro
unbound 1.4.22-1ubuntu4.14.04.3+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7080-1
CVE-2024-8508
Package Information:
https://launchpad.net/ubuntu/+source/unbound/1.20.0-1ubuntu2.1
https://launchpad.net/ubuntu/+source/unbound/1.19.2-1ubuntu3.3
https://launchpad.net/ubuntu/+source/unbound/1.13.1-1ubuntu5.8
https://launchpad.net/ubuntu/+source/unbound/1.9.4-2ubuntu1.9
[USN-7079-1] WebKitGTK vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7079-1
October 22, 2024
webkit2gtk vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
Summary:
Several security issues were fixed in WebKitGTK.
Software Description:
- webkit2gtk: Web content engine library for GTK+
Details:
Several security issues were discovered in the WebKitGTK Web and JavaScript
engines. If a user were tricked into viewing a malicious website, a remote
attacker could exploit a variety of issues related to web browser security,
including cross-site scripting attacks, denial of service attacks, and
arbitrary code execution.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.04 LTS
libjavascriptcoregtk-4.1-0 2.46.1-0ubuntu0.24.04.1
libjavascriptcoregtk-6.0-1 2.46.1-0ubuntu0.24.04.1
libwebkit2gtk-4.1-0 2.46.1-0ubuntu0.24.04.1
libwebkitgtk-6.0-4 2.46.1-0ubuntu0.24.04.1
Ubuntu 22.04 LTS
libjavascriptcoregtk-4.0-18 2.46.1-0ubuntu0.22.04.3
libjavascriptcoregtk-4.1-0 2.46.1-0ubuntu0.22.04.3
libjavascriptcoregtk-6.0-1 2.46.1-0ubuntu0.22.04.3
libwebkit2gtk-4.0-37 2.46.1-0ubuntu0.22.04.3
libwebkit2gtk-4.1-0 2.46.1-0ubuntu0.22.04.3
libwebkitgtk-6.0-4 2.46.1-0ubuntu0.22.04.3
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK, such as Epiphany, to make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7079-1
CVE-2024-40866, CVE-2024-44187
Package Information:
https://launchpad.net/ubuntu/+source/webkit2gtk/2.46.1-0ubuntu0.24.04.1
https://launchpad.net/ubuntu/+source/webkit2gtk/2.46.1-0ubuntu0.22.04.3