Jump to content

Firefox 125.0.3 release now available


AdvancedSetup

Recommended Posts

Version 122.0, first offered to Release channel users on January 23, 2024

Quote

New

  • Firefox now displays images and descriptions for search suggestions when provided by the search engine.

    screenshot of a search suggestion displaying images and descriptions

  • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.

  • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.

  • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.

  • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.

  • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.

check.6ae3794b67ae.svg

Fixed

 

Link to post

Security Vulnerabilities fixed in Firefox 122

15 security updates: 5 high priority, 10 moderate priority

Quote

Mozilla Foundation Security Advisory 2024-01

Security Vulnerabilities fixed in Firefox 122

Announced
January 23, 2024
Impact
high
Products
Firefox
Fixed in
  • Firefox 122

#CVE-2024-0741: Out of bounds write in ANGLE

Reporter
Renan Rios
Impact
high
Description

An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash.

References

#CVE-2024-0742: Failure to update user input timestamp

Reporter
Andrew McCreight
Impact
high
Description

It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load.

References

#CVE-2024-0743: Crash in NSS TLS method

Reporter
John Schanck
Impact
high
Description

An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.

References

#CVE-2024-0744: Wild pointer dereference in JavaScript

Reporter
Lukas Bernhard
Impact
high
Description

In some circumstances, JIT compiled code could have dereferenced a wild pointer value. This could have led to an exploitable crash.

References

#CVE-2024-0745: Stack buffer overflow in WebAudio

Reporter
Yangkang of 360 ATA Team
Impact
high
Description

The WebAudio OscillatorNode object was susceptible to a stack buffer overflow. This could have led to a potentially exploitable crash.

References

#CVE-2024-0746: Crash when listing printers on Linux

Reporter
Cornel Ionce
Impact
moderate
Description

A Linux user opening the print preview dialog could have caused the browser to crash.

References

#CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set

Reporter
Seongil Wi
Impact
moderate
Description

When a parent page loaded a child in an iframe with unsafe-inline, the parent Content Security Policy could have overridden the child Content Security Policy.

References

#CVE-2024-0748: Compromised content process could modify document URI

Reporter
Young Min Kim
Impact
moderate
Description

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history.

References

#CVE-2024-0749: Phishing site popup could show local origin in address bar

Reporter
Kestrel
Impact
moderate
Description

A phishing site could have repurposed an about: dialog to show phishing content with an incorrect origin in the address bar.

References

#CVE-2024-0750: Potential permissions request bypass via clickjacking

Reporter
Hafiizh
Impact
moderate
Description

A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions.

References

#CVE-2024-0751: Privilege escalation through devtools

Reporter
Rob Wu
Impact
moderate
Description

A malicious devtools extension could have been used to escalate privileges.

References

#CVE-2024-0752: Use-after-free could occur when applying update on macOS

Reporter
Nika Layzell
Impact
moderate
Description

A use-after-free crash could have occurred on macOS if a Firefox update were being applied on a very busy system. This could have resulted in an exploitable crash.

References

#CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain

Reporter
Hanno Böck
Impact
moderate
Description

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain.

References

#CVE-2024-0754: Crash when using some WASM files in devtools

Reporter
Christian Holler
Impact
moderate
Description

Some WASM source files could have caused a crash when loaded in devtools.

References

#CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Reporter
Daniel Holbert, Andrew Osmond, and the Mozilla Fuzzing Team
Impact
moderate
Description

Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 122.0.1 release now available
  • 2 weeks later...

Version 123.0, first offered to Release channel users on February 20, 2024

 

Quote

New

  • We’ve integrated search into Firefox View. You can now search through all of the tabs on each of the section subpages - Recent Browsing, Open Tabs, Recently Closed Tabs, Tabs from other devices, or History.

  • Having any issues with a website on Firefox, yet the site seems to be working as expected on another browser? You can now let us know via the Web Compatibility Reporting Tool! By filing a web compatibility issue, you’re directly helping us detect, target, and fix the most impacted sites to make your browsing experience on Firefox smoother.

check.6ae3794b67ae.svg

Fixed

  • When translating web pages, we are now also translating text in tooltips (i.e. titles) and text displayed in form controls (i.e. placeholder).

Mozilla Foundation Security Advisory 2024-05

Quote

Mozilla Foundation Security Advisory 2024-05

Security Vulnerabilities fixed in Firefox 123

Announced
February 20, 2024
Impact
high
Products
Firefox
Fixed in
  • Firefox 123

#CVE-2024-1546: Out-of-bounds memory read in networking channels

Reporter
Alfred Peters
Impact
high
Description

When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read.

References

#CVE-2024-1547: Alert dialog could have been spoofed on another site

Reporter
Irvan Kurniawan
Impact
high
Description

Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown).

References

#CVE-2024-1554: fetch could be used to effect cache poisoning

Reporter
scarlet
Impact
moderate
Description

The fetch() API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers fetch() may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a fetch() response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response.

References

#CVE-2024-1548: Fullscreen Notification could have been hidden by select element

Reporter
Hafiizh
Impact
moderate
Description

A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks.

References

#CVE-2024-1549: Custom cursor could obscure the permission dialog

Reporter
Hafiizh
Impact
moderate
Description

If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions.

References

#CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants

Reporter
Hafiizh
Impact
moderate
Description

A malicious website could have used a combination of exiting fullscreen mode and requestPointerLock to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant.

References

#CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts

Reporter
Johan Carlsson
Impact
moderate
Description

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser.

References

#CVE-2024-1555: SameSite cookies were not properly respected when opening a website from an external browser

Reporter
Narendra Bhati
Impact
moderate
Description

When opening a website using the firefox:// protocol handler, SameSite cookies were not properly respected.

References

#CVE-2024-1556: Invalid memory access in the built-in profiler

Reporter
Ronald Crane
Impact
low
Description

The incorrect object was checked for NULL in the built-in profiler, potentially leading to invalid memory access and undefined behavior. Note: This issue only affects the application when the profiler is running.

References

#CVE-2024-1552: Incorrect code generation on 32-bit ARM devices

Reporter
Gary Kwong
Impact
low
Description

Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior. Note: This issue only affects 32-bit ARM devices.

References

#CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8

Reporter
Andrew McCreight, Randell Jesup, Gabriele Svelto, Paul Bone, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2024-1557: Memory safety bugs fixed in Firefox 123

Reporter
Andrew McCreight, Randell Jesup, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 122. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

Edited by 1PW
  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 123.0 release now available
  • 2 weeks later...

Version 123.0.1, first offered to Release channel users on March 5, 2024

Quote

Fixed

  • Fixed the Firefox Translation language indicator in the address bar, displaying a colored square icon instead of the language code icon. (Bug 1879415)

  • Fixed incorrect rendering of Canvas2D conic gradients colors on Windows. (Bug 1851963)

  • Fixed a regression with the onChange event not firing when clearing the value of a textarea HTML field. (Bug 1881457)

  • Fixed availability of system-level dictionaries for Linux users with Firefox installed as a Flatpak package. (Bug 1881830)

  • Fixed a regression in the JavaScript JIT engine, incorrectly inlining strings in some cases. (Bug 1882386)

  • Fixed low contrast of text when selecting rows in the Developer tools' Storage panel. (Bug 1877090)

 

 

  • Thanks 4
Link to post
  • AdvancedSetup changed the title to Firefox 123.0.1 release now available
  • 2 weeks later...

Version 124.0, first offered to Release channel users on March 19, 2024

Quote

New

  • Caret browsing mode now also works in the PDF viewer. (Learn more)

  • In Firefox View, open tabs can now be sorted by either recent activity or tab order. Recent activity is the default setting.

  • Firefox now populates the Windows taskbar jump list more efficiently, which should allow for a smoother overall browsing experience.

  • Firefox on Mac now uses the macOS fullscreen API for all types of fullscreen windows. This should better match the expected macOS user experience for fullscreen spaces, menubar and the Dock.

  • As of Firefox 124, Qwant's availability has been expanded to all languages in the France region along with Belgium, Italy, Netherlands, Spain, and Switzerland.

Fixed

Quote

Mozilla Foundation Security Advisory 2024-12

Security Vulnerabilities fixed in Firefox 124

Announced
    March 19, 2024
Impact
    high
Products
    Firefox
Fixed in

        Firefox 124

#CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape vector

Reporter
    goodbyeselene
Impact
    high

Description

An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
References

    Bug 1872920

#CVE-2024-2606: Mishandling of WASM register values

Reporter
    P1umer
Impact
    high

Description

Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values.
References

    Bug 1879237

#CVE-2024-2607: JIT code failed to save return registers on Armv7-A

Reporter
    Gary Kwong
Impact
    high

Description

Return registers were overwritten which could have allowed an attacker to execute arbitrary code. Note: This issue only affected Armv7-A systems. Other operating systems are unaffected.
References

    Bug 1879939

#CVE-2024-2608: Integer overflow could have led to out of bounds write

Reporter
    Ronald Crane
Impact
    high

Description

AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
References

    Bug 1880692

#CVE-2023-5388: NSS susceptible to timing attack against RSA decryption

Reporter
    Hubert Kario
Impact
    moderate

Description

NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data.
References

    Bug 1780432

#CVE-2024-2609: Permission prompt input delay could expire when not in focus

Reporter
    Shaheen Fazim
Impact
    moderate

Description

The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites.
References

    Bug 1866100

#CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce leakage

Reporter
    Georg Felber and Marco Squarcina (TU Wien)
Impact
    moderate

Description

Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
References

    Bug 1871112

#CVE-2024-2611: Clickjacking vulnerability could have led to a user accidentally granting permissions

Reporter
    Hafiizh
Impact
    moderate

Description

A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
References

    Bug 1876675

#CVE-2024-2612: Self referencing object could have potentially led to a use-after-free

Reporter
    Ronald Crane
Impact
    moderate

Description

If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
References

    Bug 1879444

#CVE-2024-2613: Improper handling of QUIC ACK frame data could have led to OOM

Reporter
    Max Inden
Impact
    low

Description

Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash.
References

    Bug 1875701

#CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9

Reporter
    Noah Lokocz, Kevin Brosnan, Ryan VanderMeulen and the Mozilla Fuzzing Team
Impact
    high

Description

Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9

#CVE-2024-2615: Memory safety bugs fixed in Firefox 124

Reporter
    Paul Bone and the Mozilla Fuzzing Team
Impact
    critical

Description

Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 124

 

 

Edited by 1PW
  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 124.0 release now available
  • AdvancedSetup changed the title to Firefox 124.0.1 release now available
  • 2 weeks later...

Version 124.0.2, first offered to Release channel users on April 2, 2024

Quote

Fixed

  • Fixed an issue where users with numerous bookmarks would be unable to restore a bookmarks backup. (Bug 1884308)

  • Fixed an issue that would cause open Firefox windows to go blank or crash during video playback on sites such as Netflix. (Bug 1883932)

  • Fixed a crash that affected Linux AArch64 builds.(Bug 1866396)

  • Fixed an issue where some users experienced difficulties loading webpages due to changes made to the default AppArmor configuration shipping in Ubuntu 24.04. (Bug 1884347)

 

 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 124.0.2 release now available
  • 2 weeks later...
  • AdvancedSetup changed the title to Firefox 125.0.1 release now available

Version 125.0.2, first offered to Release channel users on April 22, 2024

Fixed: Reverted the changes recently shipped in Firefox 125 that more proactively blocked downloads from potentially untrustworthy URLs. The changes caused unexpected problems with downloading files in some situations. We plan to fix and re-enable these protections in a future release. (Bug 1892069)

  • Like 2
Link to post
  • AdvancedSetup changed the title to Firefox 125.0.2 release now available

Version 125.0.3, first offered to Release channel users on April 29, 2024

Quote

Fixed

  • Fixed an extra blank tab with an address of https://0.0.0.1 sometimes appearing when attempting to launch Firefox when it is already running (bug 1892612).

  • Fixed an issue that could cause incorrect font selection in some situations for users with the Japanese locale set (bug 1892363).

  • Fixed text corruption when dragging text containing Unicode characters on Linux systems (bug 1888202).

  • Fixed a correctness error when checking arguments.length (and not using arguments otherwise) inside a generator or async function (bug 1892699).

  • Fixed an issue that could lead to inconsistent focus handling of <select> elements when opened (bug 1893177).

 

 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 125.0.3 release now available

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.