Firefox 125, the latest release from Mozilla, addresses 15 vulnerabilities, nine of which are classified as high-severity bugs posing significant risks, including the potential for attackers to execute arbitrary code. Notably, five of these high-severity issues affect the JIT component, leading to various potential exploits such as generating incorrect code for arguments or crashing during JavaScript object tracing. Additionally, two high-severity bugs are associated with garbage collection, while the remaining pair are memory safety flaws with the potential for arbitrary code execution with sufficient attacker effort.
Apart from the high-severity vulnerabilities, the Firefox update also tackles five medium-severity security issues and one low-severity flaw. Of particular concern is CVE-2024-3302, a medium-severity bug capable of causing denial-of-service (DoS) attacks through HTTP/2 CONTINUATION frames, leveraging a novel attack method known as HTTP/2 Continuation Flood. Mozilla’s prompt response underscores their commitment to maintaining the security and integrity of their browser, prioritizing the protection of users against potential threats and exploits.
In parallel to the Firefox 125 release, Mozilla introduced Firefox ESR 115.10, an Extended Support Release designed to provide stability and security for enterprise users. This version addresses nine vulnerabilities overlapping with those patched in Firefox 125, ensuring that users across different Firefox editions receive essential security updates. By swiftly releasing updates for both regular and ESR versions, Mozilla demonstrates its proactive approach to addressing security vulnerabilities and safeguarding users’ browsing experiences.
Overall, the Firefox 125 release and the accompanying Firefox ESR 115.10 update underscore Mozilla’s ongoing efforts to fortify the browser against evolving cybersecurity threats. With a focus on addressing critical vulnerabilities, including those with potential for code execution, Mozilla aims to maintain the trust and confidence of users while reinforcing the resilience of its browser ecosystem against malicious exploitation.