{"id":"USN-6649-1","summary":"firefox vulnerabilities","details":"Multiple security issues were discovered in Firefox. If a user were\ntricked into opening a specially crafted website, an attacker could\npotentially exploit these to cause a denial of service, obtain sensitive\ninformation across domains, or execute arbitrary code. (CVE-2024-1547,\nCVE-2024-1548, CVE-2024-1549, CVE-2024-1550, CVE-2024-1553, CVE-2024-1554,\nCVE-2024-1555, CVE-2024-1557)\n\nAlfred Peters discovered that Firefox did not properly manage memory when\nstoring and re-accessing data on a networking channel. An attacker could\npotentially exploit this issue to cause a denial of service.\n(CVE-2024-1546)\n\nJohan Carlsson discovered that Firefox incorrectly handled Set-Cookie\nresponse headers in multipart HTTP responses. An attacker could\npotentially exploit this issue to inject arbitrary cookie values.\n(CVE-2024-1551)\n\nGary Kwong discovered that Firefox incorrectly generated codes on 32-bit\nARM devices, which could lead to unexpected numeric conversions or\nundefined behaviour. An attacker could possibly use this issue to cause a\ndenial of service. (CVE-2024-1552)\n\nRonald Crane discovered that Firefox did not properly manage memory when\naccessing the built-in profiler. An attacker could potentially exploit\nthis issue to cause a denial of service. (CVE-2024-1556)\n","modified":"2026-04-22T10:44:16.685534Z","published":"2024-02-22T03:11:39Z","related":["UBUNTU-CVE-2024-1546","UBUNTU-CVE-2024-1547","UBUNTU-CVE-2024-1548","UBUNTU-CVE-2024-1549","UBUNTU-CVE-2024-1550","UBUNTU-CVE-2024-1551","UBUNTU-CVE-2024-1552","UBUNTU-CVE-2024-1553","UBUNTU-CVE-2024-1554","UBUNTU-CVE-2024-1555","UBUNTU-CVE-2024-1556","UBUNTU-CVE-2024-1557"],"upstream":["CVE-2024-1546","CVE-2024-1547","CVE-2024-1548","CVE-2024-1549","CVE-2024-1550","CVE-2024-1551","CVE-2024-1552","CVE-2024-1553","CVE-2024-1554","CVE-2024-1555","CVE-2024-1556","CVE-2024-1557","UBUNTU-CVE-2024-1546","UBUNTU-CVE-2024-1547","UBUNTU-CVE-2024-1548","UBUNTU-CVE-2024-1549","UBUNTU-CVE-2024-1550","UBUNTU-CVE-2024-1551","UBUNTU-CVE-2024-1552","UBUNTU-CVE-2024-1553","UBUNTU-CVE-2024-1554","UBUNTU-CVE-2024-1555","UBUNTU-CVE-2024-1556","UBUNTU-CVE-2024-1557"],"references":[{"type":"ADVISORY","url":"https://ubuntu.com/security/notices/USN-6649-1"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1546"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1547"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1548"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1549"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1550"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1551"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1552"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1553"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1554"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1555"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1556"},{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2024-1557"}],"affected":[{"package":{"name":"firefox","ecosystem":"Ubuntu:20.04:LTS","purl":"pkg:deb/ubuntu/firefox@123.0+build3-0ubuntu0.20.04.1?arch=source&distro=focal"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"123.0+build3-0ubuntu0.20.04.1"}]}],"versions":["69.0.3+build1-0ubuntu1","70.0+build2-0ubuntu1","70.0+build2-0ubuntu2","70.0.1+build1-0ubuntu2","71.0+build2-0ubuntu2","71.0+build5-0ubuntu1","72.0.1+build1-0ubuntu1","72.0.2+build1-0ubuntu1","73.0+build1-0ubuntu1","73.0+build2-0ubuntu1","73.0+build3-0ubuntu1","73.0.1+build1-0ubuntu1","74.0+build1-0ubuntu1","74.0+build2-0ubuntu1","74.0+build2-0ubuntu2","74.0+build3-0ubuntu1","75.0+build3-0ubuntu1","76.0+build2-0ubuntu0.20.04.1","76.0.1+build1-0ubuntu0.20.04.1","77.0.1+build1-0ubuntu0.20.04.1","78.0.1+build1-0ubuntu0.20.04.1","78.0.2+build2-0ubuntu0.20.04.1","79.0+build1-0ubuntu0.20.04.1","80.0+build2-0ubuntu0.20.04.1","80.0.1+build1-0ubuntu0.20.04.1","81.0+build2-0ubuntu0.20.04.1","81.0.2+build1-0ubuntu0.20.04.1","82.0+build2-0ubuntu0.20.04.1","82.0.2+build1-0ubuntu0.20.04.1","82.0.3+build1-0ubuntu0.20.04.1","83.0+build2-0ubuntu0.20.04.1","84.0+build3-0ubuntu0.20.04.1","84.0.1+build1-0ubuntu0.20.04.1","84.0.2+build1-0ubuntu0.20.04.1","85.0+build1-0ubuntu0.20.04.1","85.0.1+build1-0ubuntu0.20.04.1","86.0+build3-0ubuntu0.20.04.1","86.0.1+build1-0ubuntu0.20.04.1","87.0+build3-0ubuntu0.20.04.2","88.0+build2-0ubuntu0.20.04.1","88.0.1+build1-0ubuntu0.20.04.2","89.0+build2-0ubuntu0.20.04.2","89.0.1+build1-0ubuntu0.20.04.1","89.0.2+build1-0ubuntu0.20.04.1","90.0+build1-0ubuntu0.20.04.1","90.0.2+build1-0ubuntu0.20.04.1","91.0+build2-0ubuntu0.20.04.1","91.0.1+build1-0ubuntu0.20.04.1","91.0.2+build1-0ubuntu0.20.04.1","92.0+build3-0ubuntu0.20.04.1","93.0+build1-0ubuntu0.20.04.1","94.0+build3-0ubuntu0.20.04.1","95.0+build1-0ubuntu0.20.04.1","95.0.1+build2-0ubuntu0.20.04.1","96.0+build2-0ubuntu0.20.04.1","97.0+build2-0ubuntu0.20.04.1","97.0.2+build1-0ubuntu0.20.04.1","98.0+build3-0ubuntu0.20.04.2","98.0.1+build2-0ubuntu0.20.04.1","98.0.2+build1-0ubuntu0.20.04.1","99.0+build2-0ubuntu0.20.04.2","100.0+build2-0ubuntu0.20.04.1","100.0.2+build1-0ubuntu0.20.04.1","101.0.1+build1-0ubuntu0.20.04.1","102.0+build2-0ubuntu0.20.04.1","103.0+build1-0ubuntu0.20.04.1","104.0+build3-0ubuntu0.20.04.1","105.0+build2-0ubuntu0.20.04.1","106.0.2+build1-0ubuntu0.20.04.1","106.0.5+build1-0ubuntu0.20.04.1","107.0+build2-0ubuntu0.20.04.1","108.0+build2-0ubuntu0.20.04.1","108.0.1+build1-0ubuntu0.20.04.1","108.0.2+build1-0ubuntu0.20.04.1","109.0+build2-0ubuntu0.20.04.1","109.0.1+build1-0ubuntu0.20.04.2","110.0+build3-0ubuntu0.20.04.1","110.0.1+build2-0ubuntu0.20.04.1","111.0+build2-0ubuntu0.20.04.1","111.0.1+build2-0ubuntu0.20.04.1","112.0+build2-0ubuntu0.20.04.1","112.0.1+build1-0ubuntu0.20.04.1","112.0.2+build1-0ubuntu0.20.04.1","113.0+build2-0ubuntu0.20.04.1","113.0.1+build1-0ubuntu0.20.04.1","113.0.2+build1-0ubuntu0.20.04.1","114.0+build3-0ubuntu0.20.04.1","114.0.1+build1-0ubuntu0.20.04.1","114.0.2+build1-0ubuntu0.20.04.1","115.0+build2-0ubuntu0.20.04.3","115.0.2+build1-0ubuntu0.20.04.1","116.0+build2-0ubuntu0.20.04.2","116.0.2+build1-0ubuntu0.20.04.1","116.0.3+build2-0ubuntu0.20.04.1","117.0+build2-0ubuntu0.20.04.1","117.0.1+build2-0ubuntu0.20.04.1","118.0.1+build1-0ubuntu0.20.04.1","118.0.2+build2-0ubuntu0.20.04.1","119.0+build2-0ubuntu0.20.04.1","119.0.1+build1-0ubuntu0.20.04.1","120.0+build2-0ubuntu0.20.04.1","120.0.1+build1-0ubuntu0.20.04.1","121.0+build1-0ubuntu0.20.04.1","121.0.1+build1-0ubuntu0.20.04.1","122.0+build2-0ubuntu0.20.04.1","122.0.1+build1-0ubuntu0.20.04.1"],"ecosystem_specific":{"binaries":[{"binary_name":"firefox","binary_version":"123.0+build3-0ubuntu0.20.04.1"},{"binary_name":"firefox-geckodriver","binary_version":"123.0+build3-0ubuntu0.20.04.1"},{"binary_name":"firefox-mozsymbols","binary_version":"123.0+build3-0ubuntu0.20.04.1"}],"availability":"No subscription required"},"database_specific":{"cves_map":{"cves":[{"id":"CVE-2024-1546","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1547","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1548","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1549","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1550","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1551","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1552","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1553","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1554","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1555","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1556","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"},{"type":"Ubuntu","score":"medium"}]},{"id":"CVE-2024-1557","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H"},{"type":"Ubuntu","score":"medium"}]}],"ecosystem":"Ubuntu:20.04:LTS"},"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-6649-1.json"}}],"schema_version":"1.7.5"}