USN-7078-1

Source
https://ubuntu.com/security/notices/USN-7078-1
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7078-1.json
JSON Data
https://api.osv.dev/v1/vulns/USN-7078-1
Upstream
Related
Published
2024-10-22T04:28:33Z
Modified
2026-02-10T04:45:29Z
Summary
firefox vulnerability
Details

Atte Kettunen discovered that Firefox did not properly validate before inserting ranges into the selection node cache. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

References

Affected packages

Ubuntu:20.04:LTS / firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@131.0.3+build1-0ubuntu0.20.04.1?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
131.0.3+build1-0ubuntu0.20.04.1

Affected versions

69.*
69.0.3+build1-0ubuntu1
70.*
70.0+build2-0ubuntu1
70.0+build2-0ubuntu2
70.0.1+build1-0ubuntu2
71.*
71.0+build2-0ubuntu2
71.0+build5-0ubuntu1
72.*
72.0.1+build1-0ubuntu1
72.0.2+build1-0ubuntu1
73.*
73.0+build1-0ubuntu1
73.0+build2-0ubuntu1
73.0+build3-0ubuntu1
73.0.1+build1-0ubuntu1
74.*
74.0+build1-0ubuntu1
74.0+build2-0ubuntu1
74.0+build2-0ubuntu2
74.0+build3-0ubuntu1
75.*
75.0+build3-0ubuntu1
76.*
76.0+build2-0ubuntu0.20.04.1
76.0.1+build1-0ubuntu0.20.04.1
77.*
77.0.1+build1-0ubuntu0.20.04.1
78.*
78.0.1+build1-0ubuntu0.20.04.1
78.0.2+build2-0ubuntu0.20.04.1
79.*
79.0+build1-0ubuntu0.20.04.1
80.*
80.0+build2-0ubuntu0.20.04.1
80.0.1+build1-0ubuntu0.20.04.1
81.*
81.0+build2-0ubuntu0.20.04.1
81.0.2+build1-0ubuntu0.20.04.1
82.*
82.0+build2-0ubuntu0.20.04.1
82.0.2+build1-0ubuntu0.20.04.1
82.0.3+build1-0ubuntu0.20.04.1
83.*
83.0+build2-0ubuntu0.20.04.1
84.*
84.0+build3-0ubuntu0.20.04.1
84.0.1+build1-0ubuntu0.20.04.1
84.0.2+build1-0ubuntu0.20.04.1
85.*
85.0+build1-0ubuntu0.20.04.1
85.0.1+build1-0ubuntu0.20.04.1
86.*
86.0+build3-0ubuntu0.20.04.1
86.0.1+build1-0ubuntu0.20.04.1
87.*
87.0+build3-0ubuntu0.20.04.2
88.*
88.0+build2-0ubuntu0.20.04.1
88.0.1+build1-0ubuntu0.20.04.2
89.*
89.0+build2-0ubuntu0.20.04.2
89.0.1+build1-0ubuntu0.20.04.1
89.0.2+build1-0ubuntu0.20.04.1
90.*
90.0+build1-0ubuntu0.20.04.1
90.0.2+build1-0ubuntu0.20.04.1
91.*
91.0+build2-0ubuntu0.20.04.1
91.0.1+build1-0ubuntu0.20.04.1
91.0.2+build1-0ubuntu0.20.04.1
92.*
92.0+build3-0ubuntu0.20.04.1
93.*
93.0+build1-0ubuntu0.20.04.1
94.*
94.0+build3-0ubuntu0.20.04.1
95.*
95.0+build1-0ubuntu0.20.04.1
95.0.1+build2-0ubuntu0.20.04.1
96.*
96.0+build2-0ubuntu0.20.04.1
97.*
97.0+build2-0ubuntu0.20.04.1
97.0.2+build1-0ubuntu0.20.04.1
98.*
98.0+build3-0ubuntu0.20.04.2
98.0.1+build2-0ubuntu0.20.04.1
98.0.2+build1-0ubuntu0.20.04.1
99.*
99.0+build2-0ubuntu0.20.04.2
100.*
100.0+build2-0ubuntu0.20.04.1
100.0.2+build1-0ubuntu0.20.04.1
101.*
101.0.1+build1-0ubuntu0.20.04.1
102.*
102.0+build2-0ubuntu0.20.04.1
103.*
103.0+build1-0ubuntu0.20.04.1
104.*
104.0+build3-0ubuntu0.20.04.1
105.*
105.0+build2-0ubuntu0.20.04.1
106.*
106.0.2+build1-0ubuntu0.20.04.1
106.0.5+build1-0ubuntu0.20.04.1
107.*
107.0+build2-0ubuntu0.20.04.1
108.*
108.0+build2-0ubuntu0.20.04.1
108.0.1+build1-0ubuntu0.20.04.1
108.0.2+build1-0ubuntu0.20.04.1
109.*
109.0+build2-0ubuntu0.20.04.1
109.0.1+build1-0ubuntu0.20.04.2
110.*
110.0+build3-0ubuntu0.20.04.1
110.0.1+build2-0ubuntu0.20.04.1
111.*
111.0+build2-0ubuntu0.20.04.1
111.0.1+build2-0ubuntu0.20.04.1
112.*
112.0+build2-0ubuntu0.20.04.1
112.0.1+build1-0ubuntu0.20.04.1
112.0.2+build1-0ubuntu0.20.04.1
113.*
113.0+build2-0ubuntu0.20.04.1
113.0.1+build1-0ubuntu0.20.04.1
113.0.2+build1-0ubuntu0.20.04.1
114.*
114.0+build3-0ubuntu0.20.04.1
114.0.1+build1-0ubuntu0.20.04.1
114.0.2+build1-0ubuntu0.20.04.1
115.*
115.0+build2-0ubuntu0.20.04.3
115.0.2+build1-0ubuntu0.20.04.1
116.*
116.0+build2-0ubuntu0.20.04.2
116.0.2+build1-0ubuntu0.20.04.1
116.0.3+build2-0ubuntu0.20.04.1
117.*
117.0+build2-0ubuntu0.20.04.1
117.0.1+build2-0ubuntu0.20.04.1
118.*
118.0.1+build1-0ubuntu0.20.04.1
118.0.2+build2-0ubuntu0.20.04.1
119.*
119.0+build2-0ubuntu0.20.04.1
119.0.1+build1-0ubuntu0.20.04.1
120.*
120.0+build2-0ubuntu0.20.04.1
120.0.1+build1-0ubuntu0.20.04.1
121.*
121.0+build1-0ubuntu0.20.04.1
121.0.1+build1-0ubuntu0.20.04.1
122.*
122.0+build2-0ubuntu0.20.04.1
122.0.1+build1-0ubuntu0.20.04.1
123.*
123.0+build3-0ubuntu0.20.04.1
123.0.1+build1-0ubuntu0.20.04.1
124.*
124.0+build1-0ubuntu0.20.04.1
124.0.1+build1-0ubuntu0.20.04.1
124.0.2+build1-0ubuntu0.20.04.1
125.*
125.0.2+build1-0ubuntu0.20.04.2
125.0.3+build1-0ubuntu0.20.04.1
126.*
126.0+build2-0ubuntu0.20.04.1
126.0.1+build1-0ubuntu0.20.04.1
127.*
127.0.2+build1-0ubuntu0.20.04.1
128.*
128.0+build2-0ubuntu0.20.04.1
129.*
129.0.1+build1-0ubuntu0.20.04.1
129.0.2+build1-0ubuntu0.20.04.1
130.*
130.0+build2-0ubuntu0.20.04.1
130.0.1+build1-0ubuntu0.20.04.1
131.*
131.0+build1.1-0ubuntu0.20.04.1
131.0.2+build1-0ubuntu0.20.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_version": "131.0.3+build1-0ubuntu0.20.04.1",
            "binary_name": "firefox"
        },
        {
            "binary_version": "131.0.3+build1-0ubuntu0.20.04.1",
            "binary_name": "firefox-dev"
        },
        {
            "binary_version": "131.0.3+build1-0ubuntu0.20.04.1",
            "binary_name": "firefox-geckodriver"
        },
        {
            "binary_version": "131.0.3+build1-0ubuntu0.20.04.1",
            "binary_name": "firefox-mozsymbols"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/usn/USN-7078-1.json"
cves_map
{
    "ecosystem": "Ubuntu:20.04:LTS",
    "cves": [
        {
            "id": "CVE-2024-9936",
            "severity": [
                {
                    "type": "CVSS_V3",
                    "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H"
                },
                {
                    "type": "Ubuntu",
                    "score": "medium"
                }
            ]
        }
    ]
}