for Windows, Linux, MacOS X and many other operating systems.
windows.
CSS, JavaScript, C++, etc. Many extensions are available.
"Nightly" rather than "Firefox" by default.
2025-03-29 11:27:32 by Benny Siegert | Files touched by this commit (2) |  |
Log message:
firefox128: update to 128.8.1
CVE-2025-2857: Incorrect handle could lead to sandbox escapes
|
2025-03-11 03:04:12 by David H. Gutteridge | Files touched by this commit (2) |  |
Log message:
firefox128: update to 128.8.0
Mozilla Foundation Security Advisory 2025-16
Security Vulnerabilities fixed in Firefox ESR 128.8
Announced
March 4, 2025
Impact
critical
Products
Firefox ESR
Fixed in Firefox ESR 128.8
#CVE-2024-43097: Overflow when growing an SkRegion's RunArray
Reporter
Google Android
Impact
critical
Description
In resizeToAtLeast of SkRegion.cpp, there was a possible out of bounds write due \
to an integer overflow
References
Bug 1945624
#CVE-2025-1930: AudioIPC StreamData could trigger a use-after-free in the \
Browser process
Reporter
dalmurino
Impact
high
Description
On Windows, a compromised content process could use bad StreamData sent over \
AudioIPC to trigger a use-after-free in the Browser process. This could have led \
to a sandbox escape.
References
Bug 1902309
#CVE-2025-1931: Use-after-free in WebTransportChild
Reporter
sherkito
Impact
high
Description
It was possible to cause a use-after-free in the content process side of a \
WebTransport connection, leading to a potentially exploitable crash.
References
Bug 1944126
#CVE-2025-1932: Inconsistent comparator in XSLT sorting led to out-of-bounds access
Reporter
Ivan Fratric of Google Project Zero
Impact
high
Description
An inconsistent comparator in xslt/txNodeSorter could have resulted in \
potentially exploitable out-of-bounds access. Only affected version 122 and \
later.
References
Bug 1944313
#CVE-2025-1933: JIT corruption of WASM i32 return values on 64-bit CPUs
Reporter
Xiangwei Zhang and kkdong of Tencent Security YUNDING LAB
Impact
high
Description
On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up \
bits from left over memory. This can potentially cause them to be treated as a \
different type.
References
Bug 1946004
#CVE-2025-1934: Unexpected GC during RegExp bailout processing
Reporter
Nils Bars
Impact
moderate
Description
It was possible to interrupt the processing of a RegExp bailout and run \
additional JavaScript, potentially triggering garbage collection when the engine \
was not expecting it.
References
Bug 1942881
#CVE-2025-1935: Clickjacking the registerProtocolHandler info-bar
Reporter
Hafiizh
Impact
low
Description
A web page could trick a user into setting that site as the default handler for \
a custom URL protocol.
References
Bug 1866661
#CVE-2025-1936: Adding %00 and a fake extension to a jar: URL changed the \
interpretation of the contents
Reporter
Surya Dev Singh
Impact
low
Description
jar: URLs retrieve local file content packaged in a ZIP archive. The null and \
everything after it was ignored when retrieving the content from the archive, \
but the fake extension after the null was used to determine the type of content. \
This could have been used to hide code in a web extension disguised as something \
else like an image.
References
Bug 1940027
#CVE-2025-1937: Memory safety bugs fixed in Firefox 136, Thunderbird 136, \
Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8
Reporter
the Mozilla Fuzzing Team, Andrew McCreight
Impact
high
Description
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, \
Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of \
memory corruption and we presume that with enough effort some of these could \
have been exploited to run arbitrary code.
References
Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR \
115.21, Firefox ESR 128.8, and Thunderbird 128.8
#CVE-2025-1938: Memory safety bugs fixed in Firefox 136, Thunderbird 136, \
Firefox ESR 128.8, and Thunderbird 128.8
Reporter
Julien Wajsberg, the Mozilla Fuzzing Team
Impact
high
Description
Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, \
and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption \
and we presume that with enough effort some of these could have been exploited \
to run arbitrary code.
References
Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, \
and Thunderbird 128.8
|
2025-02-12 07:45:45 by Ryo ONODERA | Files touched by this commit (850) |
Log message:
*: Recursive revbump from audio/flac-1.5.0
|
2025-02-04 20:19:27 by Benny Siegert | Files touched by this commit (4) |  |
Log message:
firefox128: update to 128.7.0 (security)
Security Vulnerabilities fixed in Firefox ESR 128.7
#CVE-2025-1009: Use-after-free in XSLT
Impact: high
An attacker could have caused a use-after-free via crafted XSLT data, leading
to a potentially exploitable crash.
#CVE-2025-1010: Use-after-free in Custom Highlight
Impact: high
An attacker could have caused a use-after-free via the Custom Highlight API,
leading to a potentially exploitable crash.
#CVE-2025-1011: A bug in WebAssembly code generation could result in a crash
Impact: moderate
A bug in WebAssembly code generation could have lead to a crash. It may have
been possible for an attacker to leverage this to achieve code execution.
#CVE-2025-1012: Use-after-free during concurrent delazification
Impact: moderate
A race during concurrent delazification could have led to a use-after-free.
#CVE-2024-11704: Potential double-free vulnerability in PKCS#7 decryption
handling
Impact: low
A double-free issue could have occurred in sec_pkcs7_decoder_start_decrypt()
when handling an error path. Under specific conditions, the same symmetric key
could have been freed twice, potentially leading to memory corruption.
#CVE-2025-1013: Potential opening of private browsing tabs in normal browsing
windows
Impact: low
A race condition could have led to private browsing tabs being opened in normal
browsing windows. This could have resulted in a potential privacy leak.
#CVE-2025-1014: Certificate length was not properly checked
Impact: low
Certificate length was not properly checked when added to a certificate store.
In practice only trusted data was processed.
#CVE-2025-1016: Memory safety bugs fixed in Firefox 135, Thunderbird 135,
Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird
128.7
Impact: high
Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19,
Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these
bugs showed evidence of memory corruption and we presume that with enough
effort some of these could have been exploited to run arbitrary code.
#CVE-2025-1017: Memory safety bugs fixed in Firefox 135, Thunderbird 135,
Firefox ESR 128.7, and Thunderbird 128.7
Impact: moderate
Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6,
and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption
and we presume that with enough effort some of these could have been exploited
to run arbitrary code.
|
2025-01-07 18:26:43 by Benny Siegert | Files touched by this commit (4) |  |
Log message:
firefox128, firefox128-l10n: update to 128.6.0
Security Vulnerabilities fixed in Firefox ESR 128.6
#CVE-2025-0237: WebChannel APIs susceptible to confused deputy attack
Impact: moderate
The WebChannel API, which is used to transport various information across
processes, did not check the sending principal but rather accepted the
principal being sent. This could have led to privilege escalation attacks.
#CVE-2025-0238: Use-after-free when breaking lines in text
Impact: moderate
Assuming a controlled failed memory allocation, an attacker could have
caused a use-after-free, leading to a potentially exploitable crash.
#CVE-2025-0239: Alt-Svc ALPN validation failure when redirected
Impact: moderate
When using Alt-Svc, ALPN did not properly validate certificates when the
original server is redirecting to an insecure site.
#CVE-2025-0240: Compartment mismatch when parsing JavaScript JSON module
Impact: moderate
Parsing a JavaScript module as JSON could under some circumstances cause
cross-compartment access, which may result in a use-after-free.
#CVE-2025-0241: Memory corruption when using JavaScript Text Segmentation
Impact: moderate
When segmenting specially crafted text, segmentation would corrupt memory
leading to a potentially exploitable crash.
#CVE-2025-0242: Memory safety bugs fixed in Firefox 134, Thunderbird 134,
Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird
128.6
Impact: high
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18,
Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these
bugs showed evidence of memory corruption and we presume that with enough
effort some of these could have been exploited to run arbitrary code.
#CVE-2025-0243: Memory safety bugs fixed in Firefox 134, Thunderbird 134,
Firefox ESR 128.6, and Thunderbird 128.6
Impact: moderate
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5,
and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption
and we presume that with enough effort some of these could have been exploited
to run arbitrary code.
|
2024-12-31 05:30:51 by Ryo ONODERA | Files touched by this commit (2) |
Log message:
www/firefox128: Update to 128.5.2
Changelog:
128.5.2:
Fixed
* Fixed a crash experienced by Windows users with Qihoo 360 Total Security
Antivirus software installed (bug 1934258)
128.5.1:
Fixed
* Fixed an issue that prevented some websites from loading when using SSL
Inspection. (bug 1933747)
|
2024-12-27 09:21:09 by Thomas Klausner | Files touched by this commit (1055) |
Log message:
*: recursive bump for pango requiring fontconfig 2.15
|
2024-11-26 19:41:50 by Benny Siegert | Files touched by this commit (3) |  |
Log message:
firefox128: update to 128.5.0
Security Vulnerabilities fixed in Firefox ESR 128.5
#CVE-2024-11691: Memory corruption in Apple GPU drivers
Impact: high
An attacker could have caused memory corruption due to a flaw in Apple's GPU
driver; this can be avoided by working around the flaw.
Note: This issue only affected macOS operating systems. Other operating systems
are unaffected.
#CVE-2024-11692: Select list elements could be shown over another site
Impact: moderate
An attacker could cause a select dropdown to be shown over another tab; this
could have led to user confusion and possible spoofing attacks.
#CVE-2024-11693: Download Protections were bypassed by .library-ms files on
Windows
Impact: moderate
The executable file warning was not presented when downloading .library-ms
files.
Note: This issue only affected Windows operating systems. Other operating
systems are unaffected.
#CVE-2024-11694: CSP Bypass and XSS Exposure via Web Compatibility Shims
Impact: moderate
Enhanced Tracking Protection's Strict mode may have inadvertently allowed a CSP
frame-src bypass and DOM-based XSS through the Google SafeFrame shim in the Web
Compatibility extension. This issue could have exposed users to malicious
frames masquerading as legitimate content.
#CVE-2024-11695: URL Bar Spoofing via Manipulated Punycode and Whitespace
Characters
Impact: moderate
A crafted URL containing Arabic script and whitespace characters could have
hidden the true origin of the page, resulting in a potential spoofing attack.
#CVE-2024-11696: Unhandled Exception in Add-on Signature Verification
Impact: moderate
The application failed to account for exceptions thrown by the
loadManifestFromFile method during add-on signature verification. This flaw,
triggered by an invalid or unsupported extension manifest, could have caused
runtime errors that disrupted the signature validation process. As a result,
the enforcement of signature validation for unrelated add-ons may have been
bypassed. Signature validation in this context is used to ensure that
third-party applications on the user's computer have not tampered with the
user's extensions, limiting the impact of this issue.
#CVE-2024-11697: Improper Keypress Handling in Executable File Confirmation
Dialog
Impact: low
When handling keypress events, an attacker may have been able to trick a user
into bypassing the "Open Executable File?" confirmation dialog. This \
could have
led to malicious code execution.
#CVE-2024-11698: Fullscreen Lock-Up When Modal Dialog Interrupts Transition on
macOS
Impact: low
A flaw in handling fullscreen transitions may have inadvertently caused the
application to become stuck in fullscreen mode when a modal dialog was opened
during the transition. This issue left users unable to exit fullscreen mode
using standard actions like pressing "Esc" or accessing right-click menus,
resulting in a disrupted browsing experience until the browser is restarted.
This bug only affects the application when running on macOS. Other operating
systems are unaffected.
#CVE-2024-11699: Memory safety bugs fixed in Firefox 133, Firefox ESR 128.5,
and Thunderbird 128.5
Impact: high
Memory safety bugs present in Firefox 132, Firefox ESR 128.4, and Thunderbird
128.4. Some of these bugs showed evidence of memory corruption and we presume
that with enough effort some of these could have been exploited to run
arbitrary code.
|