Jump to content

Firefox 126.0.1 release now available


AdvancedSetup

Recommended Posts

Version 116.0.3, first offered to Release channel users on August 16, 2023

Fixed

  • Fixed an issue for OPFS users (especially those using the Adobe Photoshop) that broke access to files that were locally cached in a previous version. (bug 1847989, bug 1847619)

  • Fixed an issue that was breaking screensharing for some users on Wayland. (bug 1841851)

  • Fixed an issue where a fullscreen notification was persistently being shown to a user, even after disabling it. (bug 1847901)

  • Fixed an issue where Firefox would hang when doing a Google search. (bug 1847066)

  • Thanks 1
Link to post
  • AdvancedSetup changed the title to Firefox 116.0.3 release now available
  • 2 weeks later...

Version 117.0, first offered to Release channel users on August 29, 2023

Quote

New

  • Support for credit card autofill has been extended to users running Firefox in the IT, ES, AT, BE, and PL locales.

  • macOS's users can now control the tabability of controls and links via about:preferences.
    Screenshot of new macOS tabability option in about:preferences

  • To avoid undesirable outcomes on sites which specify their own behavior when pressing shift+right-click, Firefox now has a dom.event.contextmenu.shift_suppresses_event preference to prevent the context menu from appearing.

check.6ae3794b67ae.svg

Fixed

  • YouTube video lists now scroll correctly when navigating with a screen reader.

  • Various security fixes.

features.e3de7d037f25.svg

Changed

  • Firefox no longer shows its own screen sharing indicator on Wayland desktop environments. The system default sharing indicator will be used instead.

Security Vulnerabilities fixed in Firefox 117

Announced
August 29, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 117

#CVE-2023-4573: Memory corruption in IPC CanvasTranslator

Reporter
sonakkbi
Impact
high
Description

When receiving rendering data over IPC mStream could have been destroyed when initialized, which could have led to a use-after-free causing a potentially exploitable crash.

References

#CVE-2023-4574: Memory corruption in IPC ColorPickerShownCallback

Reporter
sonakkbi
Impact
high
Description

When creating a callback over IPC for showing the Color Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash.

References

#CVE-2023-4575: Memory corruption in IPC FilePickerShownCallback

Reporter
sonakkbi
Impact
high
Description

When creating a callback over IPC for showing the File Picker window, multiple of the same callbacks could have been created at a time and eventually all simultaneously destroyed as soon as one of the callbacks finished. This could have led to a use-after-free causing a potentially exploitable crash.

References

#CVE-2023-4576: Integer Overflow in RecordedSourceSurfaceCreation

Reporter
fffvr
Impact
high
Description

On Windows, an integer overflow could occur in RecordedSourceSurfaceCreation which resulted in a heap buffer overflow potentially leaking sensitive data that could have led to a sandbox escape.
This bug only affects Firefox on Windows. Other operating systems are unaffected.

References

#CVE-2023-4577: Memory corruption in JIT UpdateRegExpStatics

Reporter
Lukas Bernhard
Impact
high
Description

When UpdateRegExpStatics attempted to access initialStringHeap it could already have been garbage collected prior to entering the function, which could potentially have led to an exploitable crash.

References

#CVE-2023-4578: Error reporting methods in SpiderMonkey could have triggered an Out of Memory Exception

Reporter
Irvan Kurniawan (@sourc7)
Impact
moderate
Description

When calling JS::CheckRegExpSyntax a Syntax Error could have been set which would end in calling convertToRuntimeErrorAndClear. A path in the function could attempt to allocate memory when none is available which would have caused a newly created Out of Memory exception to be mishandled as a Syntax Error.

References

#CVE-2023-4579: Persisted search terms were formatted as URLs

Reporter
Malte Jürgens
Impact
moderate
Description

Search queries in the default search engine could appear to have been the currently navigated URL if the search query itself was a well formed URL. This could have led to a site spoofing another if it had been maliciously set as the default search engine.

References

#CVE-2023-4580: Push notifications saved to disk unencrypted

Reporter
Harveer Singh
Impact
moderate
Description

Push notifications stored on disk in private browsing mode were not being encrypted potentially allowing the leak of sensitive information.

References

#CVE-2023-4581: XLL file extensions were downloadable without warnings

Reporter
Umar Farooq (@Puf)
Impact
moderate
Description

Excel .xll add-in files did not have a blocklist entry in Firefox's executable blocklist which allowed them to be downloaded without any warning of their potential harm.

References

#CVE-2023-4582: Buffer Overflow in WebGL glGetProgramiv

Reporter
Dohyun Lee (@l33d0hyun) of SSD-Disclosure Labs & DNSLab, Korea Univ.
Impact
low
Description

Due to large allocation checks in Angle for glsl shaders being too lenient a buffer overflow could have occured when allocating too much private shader memory on mac OS.
This bug only affects Firefox on macOS. Other operating systems are unaffected.

References

#CVE-2023-4583: Browsing Context potentially not cleared when closing Private Window

Reporter
Thejaka Maldeniya
Impact
low
Description

When checking if the Browsing Context had been discarded in HttpBaseChannel, if the load group was not available then it was assumed to have already been discarded which was not always the case for private channels after the private session had ended.

References

#CVE-2023-4584: Memory safety bugs fixed in Firefox 117, Firefox ESR 102.15, Firefox ESR 115.2, Thunderbird 102.15, and Thunderbird 115.2

Reporter
Randell Jesup, Andrew McCreight, the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 116, Firefox ESR 102.14, Firefox ESR 115.1, Thunderbird 102.14, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2023-4585: Memory safety bugs fixed in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2

Reporter
Donal Meehan, Sebastian Hengst, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 116, Firefox ESR 115.1, and Thunderbird 115.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References
 
Edited by 1PW
  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 117.0 release now available
  • 2 weeks later...

Version 117.0.1, first offered to Release channel users on September 12, 2023

Fixed

  • Fixed a bug causing links opened from outside Firefox to not open on macOS (bug 1850828)

  • Fixed a bug causing extensions using an event page for long-running tasks to be terminated while running, causing unexpected behavior changes (bug 1851373)

  • Temporarily reverted an intentional behavior change preventing JavaScript from changing URL.protocol (bug 1850954).
    NOTE: This change is expected to ship in a later Firefox release alongside other web browsers, and sites are encouraged to find alternate ways to change the protocol if needed.

  • Fixed audio worklets not working for sites using WebAssembly exception handling (bug 1851468)

  • Fixed the Reopen all tabs option in the Recently closed tabs menu sometimes failing to open all tabs (bug 1850856)

  • Fixed the bookmark's menu, sometimes remaining partially visible when minimizing Firefox (bug 1843700)

  • Fixed an issue causing incorrect time zones to be detected on some sites (bug 1848615)

  • Security fix

  • Like 1
  • Thanks 1
Link to post
  • 2 weeks later...

Version 118.0, first offered to Release channel users on September 26, 2023

New

  • Automated translation of web content is now available to Firefox users! Unlike cloud-based alternatives, translation is done locally in Firefox so that the text being translated does not leave your machine.

  • Web Audio in Firefox now uses the FDLIBM math library on all systems to improve anonymity with Fingerprint Protection.

  • The visibility of fonts on websites has been restricted to system fonts and language pack fonts to mitigate font fingerprinting in Private Browsing windows.

  • Video Effects and background blur are now available to Firefox users on Google Meet! (Note: These effects have also been released retroactively to support Firefox versions back to Firefox 115.)

  • Firefox Suggest users (US-only at this time) will now be able to see browser add-on suggestions right in the address bar based on their keywords.

check.6ae3794b67ae.svg

Fixed

Mozilla Foundation Security Advisory 2023-41

Security Vulnerabilities fixed in Firefox 118

Announced
September 26, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 118

#CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1

Reporter
sonakkbi
Impact
high
Description

A compromised content process could have provided malicious data to FilterNodeD2D1 resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

References

#CVE-2023-5169: Out-of-bounds write in PathOps

Reporter
sonakkbi
Impact
high
Description

A compromised content process could have provided malicious data in a PathRecording resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.

References

#CVE-2023-5170: Memory leak from a privileged process

Reporter
sonakkbi
Impact
high
Description

In canvas rendering, a compromised content process could have caused a surface to change unexpectedly, leading to a memory leak of a privileged process. This memory leak could be used to effect a sandbox escape if the correct data was leaked.

References

#CVE-2023-5171: Use-after-free in Ion Compiler

Reporter
Lukas Bernhard
Impact
high
Description

During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NULL bytes, and cause a potentially exploitable crash.

References

#CVE-2023-5172: Memory Corruption in Ion Hints

Reporter
Mozilla Fuzzing Team
Impact
high
Description

A hash table in the Ion Engine could have been mutated while there was a live interior reference, leading to a potential use-after-free and exploitable crash.

References

#CVE-2023-5173: Out-of-bounds write in HTTP Alternate Services

Reporter
Ronald Crane
Impact
moderate
Description

In a non-standard configuration of Firefox, an integer overflow could have occurred based on network traffic (possibly under influence of a local unprivileged webpage), leading to an out-of-bounds write to privileged process memory.
This bug only affects Firefox if a non-standard preference allowing non-HTTPS Alternate Services (network.http.altsvc.oe) is enabled.

References

#CVE-2023-5174: Double-free in process spawning on Windows

Reporter
Ronald Crane
Impact
moderate
Description

If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.
This bug only impacts Firefox on Windows when run in non-standard configurations (such as using runas). Other operating systems are unaffected.

References

#CVE-2023-5175: Use-after-free of ImageBitmap during process shutdown

Reporter
Yangkang of 360 ATA Team
Impact
low
Description

During process shutdown, it was possible that an ImageBitmap was created that would later be used after being freed from a different code path, leading to a potentially exploitable crash.

References

#CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3

Reporter
Chris Peterson, Andrew McCreight, André Bargull, Nika Layzell and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References
 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 118.0 release now available
  • AdvancedSetup changed the title to Firefox 118.0.1 release now available

The above Firefox 118.0.1 Security Advisory is deemed a critical update.

Security Vulnerability fixed in Firefox 118.0.1, Firefox ESR 115.3.1, Firefox for Android 118.1.0, and Firefox Focus for Android 118.1.0.

#CVE-2023-5217: Heap buffer overflow in libvpx

Reporter
Clément Lecigne of Google's Threat Analysis Group
Impact
critical
Description

Specific handling of an attacker-controlled VP8 media stream could lead to a heap buffer overflow in the content process. We are aware of this issue being exploited in other products in the wild.

References

  • Thanks 1
Link to post
  • 2 weeks later...

Version 118.0.2, first offered to Release channel users on October 10, 2023

Fixed

  • Thanks 1
Link to post
  • AdvancedSetup changed the title to Firefox 118.0.2 release now available
  • 2 weeks later...

Version 119.0, first offered to Release channel users on October 24, 2023

New

  • Firefox View includes more content. You can now see all open tabs, from all windows. If you sync open tabs, you’ll see all tabs from other devices. Browsing history is now listed and you can sort by date or by site. As before, recently closed tabs are also listed on Firefox View.

    To access Firefox View, select the file folder icon at the top left of your tab strip.

    screenshot of Firefox View displaying open tabs and tabs from other devices

  • Gradually rolling out in Fx119, Firefox now allows you to edit PDFs by adding images and alt text, in addition to text and drawings.

    screenshot of a photo of a red fox being added to a PDF. The alt text tool is open to the left of the photo, ready for a description to be added.

  • Recently closed tabs now persist between sessions that don't have automatic session restore enabled. Manually restoring a previous session will continue to reopen any previously open tabs or windows.

  • If you're migrating your data from Chrome, Firefox now offers the ability to import some of your extensions as well.

  • As part of Total Cookie Protection, Firefox now supports the partitioning of Blob URLs, this mitigates a potential tracking vector that third-party agents could use to track an individual.

  • The visibility of fonts to websites has been restricted to system fonts and language pack fonts in Enhanced Tracking Protection strict mode to mitigate font fingerprinting.

  • The Storage Access API web standard was updated to improve security while mitigating website breakages and further enabling the phase out of third-party cookies in Firefox.

  • Encrypted Client Hello (ECH) is now available to Firefox users, delivering a more private browsing experience. ECH extends the encryption used in TLS connections to cover more of the handshake and better protect sensitive fields. Read more about the launch of ECH on Mozilla Distilled.

  • Media sniffing is no longer applied to files served as type application/octet-stream, this allows these files to be downloaded instead of attempting playback.

  • On Windows, the mouse pointer will disappear while typing if the relevant Windows mouse properties system setting is enabled.

  • Firefox is now available in the Santali (sat) language.

check.6ae3794b67ae.svg

Fixed

  • Fixed an issue causing unexpected jumps in scroll position on Facebook.

  • Various security fixes.

Mozilla Foundation Security Advisory 2023-45

Security Vulnerabilities fixed in Firefox 119

11 Total:  3 High, 7 Moderate, 1 Low

Announced
October 24, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 119

#CVE-2023-5721: Queued up rendering could have allowed websites to clickjack

Reporter
Kelsey Gilbert
Impact
high
Description

It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an insufficient activation-delay.

References

#CVE-2023-5722: Cross-Origin size and header leakage

Reporter
annevk
Impact
moderate
Description

Using iterative requests an attacker was able to learn the size of an opaque response, as well as the contents of a server-supplied Vary header.

References

#CVE-2023-5723: Invalid cookie characters could have led to unexpected errors

Reporter
Daniel Veditz
Impact
moderate
Description

An attacker with temporary script access to a site could have set a cookie containing invalid characters using document.cookie that could have led to unknown errors.

References

#CVE-2023-5724: Large WebGL draw could have led to a crash

Reporter
pwn2car
Impact
moderate
Description

Drivers are not always robust to extremely large draw calls and in some cases this scenario could have led to a crash.

References

#CVE-2023-5725: WebExtensions could open arbitrary URLs

Reporter
Shaheen Fazim
Impact
moderate
Description

A malicious installed WebExtension could open arbitrary URLs, which under the right circumstance could be leveraged to collect sensitive user data.

References

#CVE-2023-5726: Full screen notification obscured by file open dialog on macOS

Reporter
Edgar Chen and Hafiizh
Impact
moderate
Description

A website could have obscured the full screen notification by using the file open dialog. This could have led to user confusion and possible spoofing attacks.
Note: This issue only affected macOS operating systems. Other operating systems are unaffected.

References

#CVE-2023-5727: Download Protections were bypassed by .msix, .msixbundle, .appx, and .appxbundle files on Windows

Reporter
Marco Bonardo
Impact
moderate
Description

The executable file warning was not presented when downloading .msix, .msixbundle, .appx, and .appxbundle files, which can run commands on a user's computer.
Note: This issue only affected Windows operating systems. Other operating systems are unaffected.

References

#CVE-2023-5728: Improper object tracking during GC in the JavaScript engine could have led to a crash.

Reporter
anbu
Impact
moderate
Description

During garbage collection extra operations were performed on a object that should not be. This could have led to a potentially exploitable crash.

References

#CVE-2023-5729: Fullscreen notification dialog could have been obscured by WebAuthn prompts

Reporter
Shaheen Fazim
Impact
low
Description

A malicious web site can enter fullscreen mode while simultaneously triggering a WebAuthn prompt. This could have obscured the fullscreen notification and could have been leveraged in a spoofing attack.

References

#CVE-2023-5730: Memory safety bugs fixed in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4

Reporter
Jed Davis, Andrew McCreight, Randell Jesup, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2023-5731: Memory safety bugs fixed in Firefox 119

Reporter
Steve Fink, Stefan Arentz, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 118. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

  • Like 1
Link to post
  • AdvancedSetup changed the title to Firefox 119.0 release now available
  • 2 weeks later...

Version 119.0.1, first offered to Release channel users on November 7, 2023

Fixed

  • Fixed a bug causing colors in the <select> HTML element to not be applied to dropdown menu arrows. (bug 1861253)

  • Fixed a bug with the <input> HTML element state not changing when dynamically updating the disabled attribute on an ancestor <fieldset>. (bug 1861027)

  • Fixed a bug causing elements with the indeterminate CSS selector in a radio group to not update. (bug 1861346)

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 119.0.1 release now available
  • 2 weeks later...

Version 120.0, first offered to Release channel users on November 21, 2023

New

  • Firefox supports a new “Copy Link Without Site Tracking” feature in the context menu which ensures that copied links no longer contain tracking information.

    Screenshot showing Copy Link feature

  • Firefox now supports a setting (in Preferences → Privacy & Security) to enable Global Privacy Control. With this opt-in feature, Firefox informs the websites that the user doesn’t want their data to be shared or sold.

    Screenshot showing GPC preference

  • Firefox’s private windows and ETP-Strict privacy configuration now enhance the Canvas APIs with Fingerprinting Protection, thereby continuing to protect our users’ online privacy.

  • Firefox has enabled Cookie Banner Blocker by default in private windows for all users in Germany. Firefox will now auto-refuse cookies and dismiss annoying cookie banners for supported sites.

  • Firefox has enabled URL Tracking Protection by default in private windows for all users in Germany. Firefox will remove non-essential URL query parameters that are often used to track users across the web.

  • Firefox now imports TLS trust anchors (e.g., certificates) from the operating system root store. This will be enabled by default on Windows, macOS, and Android, and if needed, can be turned off in settings (Preferences → Privacy & Security → Certificates).

  • Keyboard shortcuts have now been added for editing and deleting a selected credential on about:logins. For editing - Alt + enter (Option + return on macOS) and for deleting - Alt + Backspace (Option + Delete on macOS).

  • Users on Ubuntu Linux now have the ability to import from Chromium when both are installed as Snap packages.

  • Picture-in-Picture now supports corner snapping on Windows and Linux - just hold Ctrl as you move the PiP window.

Fixed

Mozilla Foundation Security Advisory 2023-49

Security Vulnerabilities fixed in Firefox 120

Announced
November 21, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 120

#CVE-2023-6204: Out-of-bound memory access in WebGL2 blitFramebuffer

Reporter
JSec of Hayyim Security
Impact
high
Description

On some systems—depending on the graphics settings and drivers—it was possible to force an out-of-bounds read and leak memory data into the images created on the canvas element.

References

#CVE-2023-6205: Use-after-free in MessagePort::Entangled

Reporter
Yangkang of 360 ATA Team
Impact
high
Description

It was possible to cause the use of a MessagePort after it had already been freed, which could potentially have led to an exploitable crash.

References

#CVE-2023-6206: Clickjacking permission prompts using the fullscreen transition

Reporter
Hafiizh
Impact
high
Description

The black fade animation when exiting fullscreen is roughly the length of the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear.

References

#CVE-2023-6207: Use-after-free in ReadableByteStreamQueueEntry::Buffer

Reporter
Yangkang of 360 ATA Team
Impact
high
Description

Ownership mismanagement led to a use-after-free in ReadableByteStreams

References

#CVE-2023-6208: Using Selection API would copy contents into X11 primary selection.

Reporter
turistu
Impact
moderate
Description

When using X11, text selected by the page using the Selection API was erroneously copied into the primary selection, a temporary storage not unlike the clipboard.
This bug only affects Firefox on X11. Other systems are unaffected.

References

#CVE-2023-6209: Incorrect parsing of relative URLs starting with “///“

Reporter
Rachmat Abdul Rokhim
Impact
moderate
Description

Relative URLs starting with three slashes were incorrectly parsed, and a path-traversal “/../“ part in the path could be used to override the specified host. This could contribute to security problems in web sites.

References

#CVE-2023-6210: Mixed-content resources not blocked in a javascript: pop-up

Reporter
0xgodson
Impact
low
Description

When a https: web page created a pop-up from a “javascript:” URL, that pop-up was incorrectly allowed to load blockable content such as iframes from insecure http: URLs

References

#CVE-2023-6211: Clickjacking to load insecure pages in HTTPS-only mode

Reporter
Muneaki Nishimura
Impact
low
Description

If an attacker needed a user to load an insecure http: page and knew that the user had enabled HTTPS-only mode, the attacker could have tricked the user into clicking to grant an HTTPS-only exception if they could get the user to participate in a clicking game.

References

#CVE-2023-6212: Memory safety bugs fixed in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5

Reporter
Mozilla Developers
Impact
high
Description

Memory safety bugs present in Firefox 119, Firefox ESR 115.4, and Thunderbird 115.4. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2023-6213: Memory safety bugs fixed in Firefox 120

Reporter
Mozilla Developers
Impact
high
Description

Memory safety bugs present in Firefox 119. Some of these bugs showed evidence of memory corruption, and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 120.0 release now available
  • 2 weeks later...

Version 120.0.1, first offered to Release channel users on November 30, 2023

Quote

Fixed

  • Fixed a bug that was causing persistent startup slowdowns. (bug 1867095)

  • Fixed an issue that was causing 100% CPU usage on sites such as Google Maps. (bug 1866409)

  • Fixed an issue that was causing YouTube videos to show a green screen when hardware acceleration was enabled. (bug 1865928)

  • Fixed an issue where the status bar was still visible when viewing fullscreen video. (bug 1853896)

  • Fixed a startup crash affecting Linux users on some aarch64 systems with page sizes other than 4KB. (bug 1866025)

 

  • Thanks 1
Link to post
  • AdvancedSetup changed the title to Firefox 120.0.1 release now available
  • 3 weeks later...

Version 121.0 first offered to Release channel users on December 19, 2023

Various security fixes.

 

New

  • Firefox now prompts Windows users to install the Microsoft AV1 Video Extension to enable hardware decoding support for the AV1 video codec from about:support if not already installed.

    I do not exactly understand what this means. Does it has to do with streaming videos or watching videos on Youtube or so?

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 121.0 release now available

Security Vulnerabilities fixed in Firefox 121 - MFSA 2023-56

18 Security fixes: 5 High, 8 Moderate and 5 Low-impact fixes.

Quote

Mozilla Foundation Security Advisory 2023-56

Security Vulnerabilities fixed in Firefox 121

Announced
December 19, 2023
Impact
high
Products
Firefox
Fixed in
  • Firefox 121

#CVE-2023-6856: Heap-buffer-overflow affecting WebGL DrawElementsInstanced method with Mesa VM driver

Reporter
DoHyun Lee
Impact
high
Description

The WebGL DrawElementsInstanced method was susceptible to a heap buffer overflow when used on systems with the Mesa VM driver. This issue could allow an attacker to perform remote code execution and sandbox escape.

References

#CVE-2023-6135: NSS susceptible to "Minerva" attack

Reporter
George Pantela (Red Hat) and Hubert Kario (Red Hat)
Impact
high
Description

Multiple NSS NIST curves were susceptible to a side-channel attack known as "Minerva". This attack could potentially allow an attacker to recover the private key.

References

#CVE-2023-6865: Potential exposure of uninitialized data in EncryptingOutputStream

Reporter
Jan Varga
Impact
high
Description

EncryptingOutputStream was susceptible to exposing uninitialized data. This issue could only be abused in order to write data to a local disk which may have implications for private browsing mode.

References

#CVE-2023-6857: Symlinks may resolve to smaller than expected buffers

Reporter
Jed Davis
Impact
moderate
Description

When resolving a symlink, a race may occur where the buffer passed to readlink may actually be smaller than necessary.
This bug only affects Firefox on Unix-based operating systems (Android, Linux, MacOS). Windows is unaffected.

References

#CVE-2023-6858: Heap buffer overflow in nsTextFragment

Reporter
Irvan Kurniawan
Impact
moderate
Description

Firefox was susceptible to a heap buffer overflow in nsTextFragment due to insufficient OOM handling.

References

#CVE-2023-6859: Use-after-free in PR_GetIdentitiesLayer

Reporter
Irvan Kurniawan
Impact
moderate
Description

A use-after-free condition affected TLS socket creation when under memory pressure.

References

#CVE-2023-6866: TypedArrays lack sufficient exception handling

Reporter
Tom Schuster
Impact
moderate
Description

TypedArrays can be fallible and lacked proper exception handling. This could lead to abuse in other APIs which expect TypedArrays to always succeed.

References

#CVE-2023-6860: Potential sandbox escape due to VideoBridge lack of texture validation

Reporter
Andrew Osmond
Impact
moderate
Description

The VideoBridge allowed any content process to use textures produced by remote decoders. This could be abused to escape the sandbox.

References

#CVE-2023-6867: Clickjacking permission prompts using the popup transition

Reporter
Hafiizh
Impact
moderate
Description

The timing of a button click causing a popup to disappear was approximately the same length as the anti-clickjacking delay on permission prompts. It was possible to use this fact to surprise users by luring them to click where the permission grant button would be about to appear.

References

#CVE-2023-6861: Heap buffer overflow affected nsWindow::PickerOpen(void) in headless mode

Reporter
Yangkang of 360 ATA Team
Impact
moderate
Description

The nsWindow::PickerOpen(void) method was susceptible to a heap buffer overflow when running in headless mode.

References

#CVE-2023-6868: WebPush requests on Firefox for Android did not require VAPID key

Reporter
John-Mark Gurney
Impact
moderate
Description

In some instances, the user-agent would allow push requests which lacked a valid VAPID even though the push manager subscription defined one. This could allow empty messages to be sent from unauthorized parties.
This bug only affects Firefox on Android.

References

#CVE-2023-6869: Content can paint outside of sandboxed iframe

Reporter
Oriol Brufau
Impact
low
Description

A <dialog> element could have been manipulated to paint content outside of a sandboxed iframe. This could allow untrusted content to display under the guise of trusted content.

References

#CVE-2023-6870: Android Toast notifications may obscure fullscreen event notifications

Reporter
Hafiizh
Impact
low
Description

Applications which spawn a Toast notification in a background thread may have obscured fullscreen notifications displayed by Firefox.
This issue only affects Android versions of Firefox and Firefox Focus.

References

#CVE-2023-6871: Lack of protocol handler warning in some instances

Reporter
Roy Gunsen
Impact
low
Description

Under certain conditions, Firefox did not display a warning when a user attempted to navigate to a new protocol handler.

References

#CVE-2023-6872: Browsing history leaked to syslogs via GNOME

Reporter
honorton via Tor Browser
Impact
low
Description

Browser tab titles were being leaked by GNOME to system logs. This could potentially expose the browsing habits of users running in a private tab.

References

#CVE-2023-6863: Undefined behavior in ShutdownObserver()

Reporter
Ronald Crane
Impact
low
Description

The ShutdownObserver() was susceptible to potentially undefined behavior due to its reliance on a dynamic type that lacked a virtual destructor.

References

#CVE-2023-6864: Memory safety bugs fixed in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6

Reporter
Andrew McCreight, the Mozilla Fuzzing Team, Randell Jesup, Valentin Gosu (he/him), Karl Tomlinson
Impact
high
Description

Memory safety bugs present in Firefox 120, Firefox ESR 115.5, and Thunderbird 115.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2023-6873: Memory safety bugs fixed in Firefox 121

Reporter
Andrew McCreight, Yury Delendik
Impact
high
Description

Memory safety bugs present in Firefox 120. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

  • Like 1
  • Thanks 1
Link to post
  • 3 weeks later...

Schedule Update

Quote

Schedule Update

  • 121
    • Android 121.0.1 planned dot release live at 25% rollout
    • Firefox iOS 121.1 planned dot release live with a phased rollout
    • Desktop and Mobile planned dot release scheduled for Tuesday 2024-01-09
      • gtb on Monday 2024-01-08
      • Please ensure all uplift requests are submitted by EOD, Friday 2024-01-05

 

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 121.0.1 release now available

Version 121.0.1, first offered to Release channel users on January 9, 2024

Quote

Fixed

  • Fixed unexpected line wrapping in some CJK contexts caused by changes in ideographic space handling. (Bug 1870973)

  • Fixed a hang when loading sites containing column-based layouts under some circumstances. (Bug 1867784)

  • Fixed missing rounded corners for videos playing over another video. (Bug 1869994)

  • Fixed Firefox not closing properly and other applications being unable to use a USB security key after being previously used during a Firefox session. (Bug 1863135)

 

 

  • Like 1
Link to post

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.