Jump to content

Firefox 127.0.2 release now available


AdvancedSetup

Recommended Posts

Version 122.0, first offered to Release channel users on January 23, 2024

Quote

New

  • Firefox now displays images and descriptions for search suggestions when provided by the search engine.

    screenshot of a search suggestion displaying images and descriptions

  • The translations feature received an improvement in the quality of translated webpages. The results should be much more stable. This fixes issues where the content of a page could disappear when translated, or interactive widgets could break.

  • Firefox now supports creating and using passkeys stored in the iCloud Keychain on macOS.

  • MDN Web Docs article suggestions from Firefox Suggest will be available in the address bar for users searching for web development-related information.

  • The line breaking rules of Web content now match the Unicode Standard. This improves Web Browser compatibility for line breaking. An additional improvement for East Asian and South East Asian end users, Firefox now supports proper language-aware word selection when double-clicking on text for languages including Chinese, Japanese, Burmese, Lao, Khmer, and Thai.

  • Firefox now ships with a new .deb package for Linux users on Ubuntu, Debian, and Linux Mint.

check.6ae3794b67ae.svg

Fixed

 

Link to post

Security Vulnerabilities fixed in Firefox 122

15 security updates: 5 high priority, 10 moderate priority

Quote

Mozilla Foundation Security Advisory 2024-01

Security Vulnerabilities fixed in Firefox 122

Announced
January 23, 2024
Impact
high
Products
Firefox
Fixed in
  • Firefox 122

#CVE-2024-0741: Out of bounds write in ANGLE

Reporter
Renan Rios
Impact
high
Description

An out of bounds write in ANGLE could have allowed an attacker to corrupt memory leading to a potentially exploitable crash.

References

#CVE-2024-0742: Failure to update user input timestamp

Reporter
Andrew McCreight
Impact
high
Description

It was possible for certain browser prompts and dialogs to be activated or dismissed unintentionally by the user due to an incorrect timestamp used to prevent input after page load.

References

#CVE-2024-0743: Crash in NSS TLS method

Reporter
John Schanck
Impact
high
Description

An unchecked return value in TLS handshake code could have caused a potentially exploitable crash.

References

#CVE-2024-0744: Wild pointer dereference in JavaScript

Reporter
Lukas Bernhard
Impact
high
Description

In some circumstances, JIT compiled code could have dereferenced a wild pointer value. This could have led to an exploitable crash.

References

#CVE-2024-0745: Stack buffer overflow in WebAudio

Reporter
Yangkang of 360 ATA Team
Impact
high
Description

The WebAudio OscillatorNode object was susceptible to a stack buffer overflow. This could have led to a potentially exploitable crash.

References

#CVE-2024-0746: Crash when listing printers on Linux

Reporter
Cornel Ionce
Impact
moderate
Description

A Linux user opening the print preview dialog could have caused the browser to crash.

References

#CVE-2024-0747: Bypass of Content Security Policy when directive unsafe-inline was set

Reporter
Seongil Wi
Impact
moderate
Description

When a parent page loaded a child in an iframe with unsafe-inline, the parent Content Security Policy could have overridden the child Content Security Policy.

References

#CVE-2024-0748: Compromised content process could modify document URI

Reporter
Young Min Kim
Impact
moderate
Description

A compromised content process could have updated the document URI. This could have allowed an attacker to set an arbitrary URI in the address bar or history.

References

#CVE-2024-0749: Phishing site popup could show local origin in address bar

Reporter
Kestrel
Impact
moderate
Description

A phishing site could have repurposed an about: dialog to show phishing content with an incorrect origin in the address bar.

References

#CVE-2024-0750: Potential permissions request bypass via clickjacking

Reporter
Hafiizh
Impact
moderate
Description

A bug in popup notifications delay calculation could have made it possible for an attacker to trick a user into granting permissions.

References

#CVE-2024-0751: Privilege escalation through devtools

Reporter
Rob Wu
Impact
moderate
Description

A malicious devtools extension could have been used to escalate privileges.

References

#CVE-2024-0752: Use-after-free could occur when applying update on macOS

Reporter
Nika Layzell
Impact
moderate
Description

A use-after-free crash could have occurred on macOS if a Firefox update were being applied on a very busy system. This could have resulted in an exploitable crash.

References

#CVE-2024-0753: HSTS policy on subdomain could bypass policy of upper domain

Reporter
Hanno Böck
Impact
moderate
Description

In specific HSTS configurations an attacker could have bypassed HSTS on a subdomain.

References

#CVE-2024-0754: Crash when using some WASM files in devtools

Reporter
Christian Holler
Impact
moderate
Description

Some WASM source files could have caused a crash when loaded in devtools.

References

#CVE-2024-0755: Memory safety bugs fixed in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7

Reporter
Daniel Holbert, Andrew Osmond, and the Mozilla Fuzzing Team
Impact
moderate
Description

Memory safety bugs present in Firefox 121, Firefox ESR 115.6, and Thunderbird 115.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 122.0.1 release now available
  • 2 weeks later...

Version 123.0, first offered to Release channel users on February 20, 2024

 

Quote

New

  • We’ve integrated search into Firefox View. You can now search through all of the tabs on each of the section subpages - Recent Browsing, Open Tabs, Recently Closed Tabs, Tabs from other devices, or History.

  • Having any issues with a website on Firefox, yet the site seems to be working as expected on another browser? You can now let us know via the Web Compatibility Reporting Tool! By filing a web compatibility issue, you’re directly helping us detect, target, and fix the most impacted sites to make your browsing experience on Firefox smoother.

check.6ae3794b67ae.svg

Fixed

  • When translating web pages, we are now also translating text in tooltips (i.e. titles) and text displayed in form controls (i.e. placeholder).

Mozilla Foundation Security Advisory 2024-05

Quote

Mozilla Foundation Security Advisory 2024-05

Security Vulnerabilities fixed in Firefox 123

Announced
February 20, 2024
Impact
high
Products
Firefox
Fixed in
  • Firefox 123

#CVE-2024-1546: Out-of-bounds memory read in networking channels

Reporter
Alfred Peters
Impact
high
Description

When storing and re-accessing data on a networking channel, the length of buffers may have been confused, resulting in an out-of-bounds memory read.

References

#CVE-2024-1547: Alert dialog could have been spoofed on another site

Reporter
Irvan Kurniawan
Impact
high
Description

Through a series of API calls and redirects, an attacker-controlled alert dialog could have been displayed on another website (with the victim website's URL shown).

References

#CVE-2024-1554: fetch could be used to effect cache poisoning

Reporter
scarlet
Impact
moderate
Description

The fetch() API and navigation incorrectly shared the same cache, as the cache key did not include the optional headers fetch() may contain. Under the correct circumstances, an attacker may have been able to poison the local browser cache by priming it with a fetch() response controlled by the additional headers. Upon navigation to the same URL, the user would see the cached response instead of the expected response.

References

#CVE-2024-1548: Fullscreen Notification could have been hidden by select element

Reporter
Hafiizh
Impact
moderate
Description

A website could have obscured the fullscreen notification by using a dropdown select input element. This could have led to user confusion and possible spoofing attacks.

References

#CVE-2024-1549: Custom cursor could obscure the permission dialog

Reporter
Hafiizh
Impact
moderate
Description

If a website set a large custom cursor, portions of the cursor could have overlapped with the permission dialog, potentially resulting in user confusion and unexpected granted permissions.

References

#CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants

Reporter
Hafiizh
Impact
moderate
Description

A malicious website could have used a combination of exiting fullscreen mode and requestPointerLock to cause the user's mouse to be re-positioned unexpectedly, which could have led to user confusion and inadvertently granting permissions they did not intend to grant.

References

#CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts

Reporter
Johan Carlsson
Impact
moderate
Description

Set-Cookie response headers were being incorrectly honored in multipart HTTP responses. If an attacker could control the Content-Type response header, as well as control part of the response body, they could inject Set-Cookie response headers that would have been honored by the browser.

References

#CVE-2024-1555: SameSite cookies were not properly respected when opening a website from an external browser

Reporter
Narendra Bhati
Impact
moderate
Description

When opening a website using the firefox:// protocol handler, SameSite cookies were not properly respected.

References

#CVE-2024-1556: Invalid memory access in the built-in profiler

Reporter
Ronald Crane
Impact
low
Description

The incorrect object was checked for NULL in the built-in profiler, potentially leading to invalid memory access and undefined behavior. Note: This issue only affects the application when the profiler is running.

References

#CVE-2024-1552: Incorrect code generation on 32-bit ARM devices

Reporter
Gary Kwong
Impact
low
Description

Incorrect code generation could have led to unexpected numeric conversions and potential undefined behavior. Note: This issue only affects 32-bit ARM devices.

References

#CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8

Reporter
Andrew McCreight, Randell Jesup, Gabriele Svelto, Paul Bone, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 122, Firefox ESR 115.7, and Thunderbird 115.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2024-1557: Memory safety bugs fixed in Firefox 123

Reporter
Andrew McCreight, Randell Jesup, and the Mozilla Fuzzing Team
Impact
high
Description

Memory safety bugs present in Firefox 122. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

Edited by 1PW
  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 123.0 release now available
  • 2 weeks later...

Version 123.0.1, first offered to Release channel users on March 5, 2024

Quote

Fixed

  • Fixed the Firefox Translation language indicator in the address bar, displaying a colored square icon instead of the language code icon. (Bug 1879415)

  • Fixed incorrect rendering of Canvas2D conic gradients colors on Windows. (Bug 1851963)

  • Fixed a regression with the onChange event not firing when clearing the value of a textarea HTML field. (Bug 1881457)

  • Fixed availability of system-level dictionaries for Linux users with Firefox installed as a Flatpak package. (Bug 1881830)

  • Fixed a regression in the JavaScript JIT engine, incorrectly inlining strings in some cases. (Bug 1882386)

  • Fixed low contrast of text when selecting rows in the Developer tools' Storage panel. (Bug 1877090)

 

 

  • Thanks 4
Link to post
  • AdvancedSetup changed the title to Firefox 123.0.1 release now available
  • 2 weeks later...

Version 124.0, first offered to Release channel users on March 19, 2024

Quote

New

  • Caret browsing mode now also works in the PDF viewer. (Learn more)

  • In Firefox View, open tabs can now be sorted by either recent activity or tab order. Recent activity is the default setting.

  • Firefox now populates the Windows taskbar jump list more efficiently, which should allow for a smoother overall browsing experience.

  • Firefox on Mac now uses the macOS fullscreen API for all types of fullscreen windows. This should better match the expected macOS user experience for fullscreen spaces, menubar and the Dock.

  • As of Firefox 124, Qwant's availability has been expanded to all languages in the France region along with Belgium, Italy, Netherlands, Spain, and Switzerland.

Fixed

Quote

Mozilla Foundation Security Advisory 2024-12

Security Vulnerabilities fixed in Firefox 124

Announced
    March 19, 2024
Impact
    high
Products
    Firefox
Fixed in

        Firefox 124

#CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape vector

Reporter
    goodbyeselene
Impact
    high

Description

An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. Note: This issue only affected Windows operating systems. Other operating systems are unaffected.
References

    Bug 1872920

#CVE-2024-2606: Mishandling of WASM register values

Reporter
    P1umer
Impact
    high

Description

Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values.
References

    Bug 1879237

#CVE-2024-2607: JIT code failed to save return registers on Armv7-A

Reporter
    Gary Kwong
Impact
    high

Description

Return registers were overwritten which could have allowed an attacker to execute arbitrary code. Note: This issue only affected Armv7-A systems. Other operating systems are unaffected.
References

    Bug 1879939

#CVE-2024-2608: Integer overflow could have led to out of bounds write

Reporter
    Ronald Crane
Impact
    high

Description

AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding() and AppendEncodedCharacters() could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write.
References

    Bug 1880692

#CVE-2023-5388: NSS susceptible to timing attack against RSA decryption

Reporter
    Hubert Kario
Impact
    moderate

Description

NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data.
References

    Bug 1780432

#CVE-2024-2609: Permission prompt input delay could expire when not in focus

Reporter
    Shaheen Fazim
Impact
    moderate

Description

The permission prompt input delay could have expired while the window is not in focus, which made the prompt vulnerable to clickjacking by malicious websites.
References

    Bug 1866100

#CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce leakage

Reporter
    Georg Felber and Marco Squarcina (TU Wien)
Impact
    moderate

Description

Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies.
References

    Bug 1871112

#CVE-2024-2611: Clickjacking vulnerability could have led to a user accidentally granting permissions

Reporter
    Hafiizh
Impact
    moderate

Description

A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions.
References

    Bug 1876675

#CVE-2024-2612: Self referencing object could have potentially led to a use-after-free

Reporter
    Ronald Crane
Impact
    moderate

Description

If an attacker could find a way to trigger a particular code path in SafeRefPtr, it could have triggered a crash or potentially be leveraged to achieve code execution.
References

    Bug 1879444

#CVE-2024-2613: Improper handling of QUIC ACK frame data could have led to OOM

Reporter
    Max Inden
Impact
    low

Description

Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash.
References

    Bug 1875701

#CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9

Reporter
    Noah Lokocz, Kevin Brosnan, Ryan VanderMeulen and the Mozilla Fuzzing Team
Impact
    high

Description

Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9

#CVE-2024-2615: Memory safety bugs fixed in Firefox 124

Reporter
    Paul Bone and the Mozilla Fuzzing Team
Impact
    critical

Description

Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References

    Memory safety bugs fixed in Firefox 124

 

 

Edited by 1PW
  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 124.0 release now available
  • AdvancedSetup changed the title to Firefox 124.0.1 release now available
  • 2 weeks later...

Version 124.0.2, first offered to Release channel users on April 2, 2024

Quote

Fixed

  • Fixed an issue where users with numerous bookmarks would be unable to restore a bookmarks backup. (Bug 1884308)

  • Fixed an issue that would cause open Firefox windows to go blank or crash during video playback on sites such as Netflix. (Bug 1883932)

  • Fixed a crash that affected Linux AArch64 builds.(Bug 1866396)

  • Fixed an issue where some users experienced difficulties loading webpages due to changes made to the default AppArmor configuration shipping in Ubuntu 24.04. (Bug 1884347)

 

 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 124.0.2 release now available
  • 2 weeks later...
  • AdvancedSetup changed the title to Firefox 125.0.1 release now available

Version 125.0.2, first offered to Release channel users on April 22, 2024

Fixed: Reverted the changes recently shipped in Firefox 125 that more proactively blocked downloads from potentially untrustworthy URLs. The changes caused unexpected problems with downloading files in some situations. We plan to fix and re-enable these protections in a future release. (Bug 1892069)

  • Like 2
Link to post
  • AdvancedSetup changed the title to Firefox 125.0.2 release now available

Version 125.0.3, first offered to Release channel users on April 29, 2024

Quote

Fixed

  • Fixed an extra blank tab with an address of https://0.0.0.1 sometimes appearing when attempting to launch Firefox when it is already running (bug 1892612).

  • Fixed an issue that could cause incorrect font selection in some situations for users with the Japanese locale set (bug 1892363).

  • Fixed text corruption when dragging text containing Unicode characters on Linux systems (bug 1888202).

  • Fixed a correctness error when checking arguments.length (and not using arguments otherwise) inside a generator or async function (bug 1892699).

  • Fixed an issue that could lead to inconsistent focus handling of <select> elements when opened (bug 1893177).

 

 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 125.0.3 release now available
  • 2 weeks later...

Version 126.0, first offered to Release channel users on May 14, 2024

Quote

New

  • The Copy Without Site Tracking option can now remove parameters from nested URLs. It also includes expanded support for blocking over 300 tracking parameters from copied links, including those from major shopping websites. Keep those trackers away when sharing links!

    screenshot of the context menu when right clicking a URL and demonstrating the Copy Without Site Tracking option

  • Firefox now supports Content-encoding: zstd (zstandard compression). This is an alternative to broti and gzip compression for web content, and can provide higher compression levels for the same CPU used, or conversely lower server CPU use to get the same compression. This is heavily used on sites such as Facebook.

  • Catalan is now available in Firefox Translations.

  • Enabled AV1 hardware decode acceleration on macOS for M3 Macs.

  • Telemetry was added to create an aggregate count of searches by category to broadly inform search feature development. These categories are based on 20 high-level content types, such as “sports,” “business,” and “travel”. This data will not be associated with specific users and will be collected using OHTTP to remove IP addresses as potentially identifying metadata. No profiling will be performed, and no data will be shared with third parties.

check.6ae3794b67ae.svg

Fixed

features.e3de7d037f25.svg

Changed

  • The URL Paste Suggestion feature added in Fx125 was temporarily disabled while the team investigates a potential performance issue. The feature will be re-enabled in a future release once the performance issue is addressed.

Mozilla Foundation Security Advisory 2024-21

Impact: 3 High, 9 Moderate, 5 Low  Total: 17

Quote

Security Vulnerabilities fixed in Firefox 126

Announced
May 14, 2024
Impact
high
Products
Firefox
Fixed in
  • Firefox 126

#CVE-2024-4764: Use-after-free when audio input connected with multiple consumers

Reporter
Jan-Ivar Bruaroey
Impact
high
Description

Multiple WebRTC threads could have claimed a newly connected audio input leading to use-after-free.

References

#CVE-2024-4367: Arbitrary JavaScript execution in PDF.js

Reporter
Thomas Rinsma of Codean Labs
Impact
high
Description

A type check was missing when handling fonts in PDF.js, which would allow arbitrary JavaScript execution in the PDF.js context.

References

#CVE-2024-4765: Web application manifests could have been overwritten via hash collision

Reporter
Dana Keeler
Impact
moderate
Description

Web application manifests were stored by using an insecure MD5 hash which allowed for a hash collision to overwrite another application's manifest. This could have been exploited to run arbitrary code in another application's context.
This issue only affects Firefox for Android. Other versions of Firefox are unaffected.

References

#CVE-2024-4766: Fullscreen notification could have been obscured on Firefox for Android

Reporter
Hafiizh
Impact
moderate
Description

Different techniques existed to obscure the fullscreen notification in Firefox for Android. These could have lead to potential user confusion and spoofing attacks.
This bug only affects Firefox for Android. Other versions of Firefox are unaffected.

References

#CVE-2024-4767: IndexedDB files retained in private browsing mode

Reporter
Kim Do Hun via Tor Browser
Impact
moderate
Description

If the browser.privatebrowsing.autostart preference is enabled, IndexedDB files were not properly deleted when the window was closed. This preference is disabled by default in Firefox.

References

#CVE-2024-4768: Potential permissions request bypass via clickjacking

Reporter
Hafiizh
Impact
moderate
Description

A bug in popup notifications' interaction with WebAuthn made it easier for an attacker to trick a user into granting permissions.

References

#CVE-2024-4769: Cross-origin responses could be distinguished between script and non-script content-types

Reporter
Shaheen Fazim
Impact
moderate
Description

When importing resources using Web Workers, error messages would distinguish the difference between application/javascript responses and non-script responses. This could have been abused to learn information cross-origin.

References

#CVE-2024-4770: Use-after-free could occur when printing to PDF

Reporter
Irvan Kurniawan
Impact
moderate
Description

When saving a page to PDF, certain font styles could have led to a potential use-after-free crash.

References

#CVE-2024-4771: Failed allocation could lead to use-after-free

Reporter
Irvan Kurniawan
Impact
moderate
Description

A memory allocation check was missing which would lead to a use-after-free if the allocation failed. This could have triggered a crash or potentially be leveraged to achieve code execution.

References

#CVE-2024-4772: Use of insecure rand() function to generate nonce

Reporter
Hanno Böck
Impact
low
Description

An HTTP digest authentication nonce value was generated using rand() which could lead to predictable values.

References

#CVE-2024-4773: URL bar could be cleared after network error

Reporter
Islam
Impact
low
Description

When a network error occurred during page load, the prior content could have remained in view with a blank URL bar. This could have been used to obfuscate a spoofed web site.

References

#CVE-2024-4774: Undefined behavior in ShmemCharMapHashEntry()

Reporter
Ronald Crane
Impact
low
Description

The ShmemCharMapHashEntry() code was susceptible to potentially undefined behavior by bypassing the move semantics for one of its data members.

References

#CVE-2024-4775: Invalid memory access in the built-in profiler

Reporter
Lukas Bernhard
Impact
low
Description

An iterator stop condition was missing when handling WASM code in the built-in profiler, potentially leading to invalid memory access and undefined behavior. Note: This issue only affects the application when the profiler is running.

References

#CVE-2024-4776: Window may remain disabled after file dialog is shown in full-screen

Reporter
Raphael
Impact
low
Description

A file dialog shown while in full-screen mode could have resulted in the window remaining disabled.

References

#CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11, and Thunderbird 115.11

Reporter
Daniel Holbert and the Mozilla Fuzzing Team
Impact
moderate
Description

Memory safety bugs present in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

#CVE-2024-4778: Memory safety bugs fixed in Firefox 126

Reporter
Mozilla Fuzzing Team
Impact
moderate
Description

Memory safety bugs present in Firefox 125. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

References

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 126.0 release now available
  • Root Admin

Firefox's idea of privacy and my idea of privacy don't agree. My idea of privacy is to 100% NEVER collect ANY data unless I specifically and personally enable it and not some update or installation setting it to collect by default.

 

See what’s changing in Firefox: Better insights, same privacy
https://blog.mozilla.org/en/products/firefox/firefox-search-update/

How do I opt-in or opt-out of sending performance data?
https://support.mozilla.org/en-US/kb/share-data-mozilla-help-improve-firefox

Telemetry collection and deletion
https://support.mozilla.org/en-US/kb/telemetry-clientid

 

about:telemetry

image.png

Other settings

image.png

 

image.png

image.png

image.png

 

 

  • Like 2
Link to post
  • 2 weeks later...

Version 126.0.1, first offered to Release channel users on May 28, 2024

Quote

 

Fixed

  • Fixed an issue with reading tagged PDF documents in a screen reader. (Bug 1894849)

  • Fixed not displaying localized text for non-en-US locales in the Crash Reporter dialog box on macOS. (Bug 1896097)

  • Fixed issues with drag-and-drop functionality on Linux. (Bug 1897115)

  • Fixed an issue causing high GPU memory usage on certain versions of AMD cards. (Bug 1897006)

     

 

  • Thanks 3
Link to post
  • AdvancedSetup changed the title to Firefox 126.0.1 release now available

A post has been published elsewhere that mentions Firefox 126.0.1 suffers app crashes by a few Windows users shortly after a version update is made.

As of today, Mozilla Firefox developers have made a version 126.0.2 RC1 available.

FWIW

  • Thanks 1
Link to post

Hello @AdvancedSetup:

I usually update the day before the release notes are published (i.e., Mondays). If I see trouble, it's likely I'll post a warning instead of a release update to this topic.

I had no observable troubles just after my v126.0.1 update. I took one short glance at Mozilla's Bugzilla for Firefox, but nothing caught my eye yet.

Again, if the user doesn't see an app crash immediately after update, they likely won't see one later.

HTH

  • Thanks 1
Link to post
  • 2 weeks later...
  • AdvancedSetup changed the title to Firefox 127.0 release now available

Version 127.0.1, first offered to Release channel users on June 19, 2024

Quote

Fixed

  • Fixed an issue where users with a primary password set on their profile could lose their previous session of tabs upon upgrading if they dismissed the primary password prompt (bug 1901899).

  • Fixed an issue where Linux users with accessibility.monoaudio.enable set to true were experiencing slow audio speeds (bug 1900972).

  • Fixed an issue where, in some circumstances, the Firefox installer on Windows failed to complete the installation (bug 1896868).

  • Fixed an issue causing Firefox to incorrectly reject cookies for certain websites (bug 1901325).

     

 

  • Thanks 2
Link to post
  • AdvancedSetup changed the title to Firefox 127.0.1 release now available
  • AdvancedSetup changed the title to Firefox 127.0.2 release now available

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
Back to top
×
×
  • Create New...

Important Information

This site uses cookies - We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.