Security Experts:

Connect with us

Hi, what are you looking for?



Firefox 102 Patches 19 Vulnerabilities, Improves Privacy

Mozilla this week announced the availability of Firefox 102 in the stable channel with patches for 19 vulnerabilities, including four high-severity bugs.

Mozilla this week announced the availability of Firefox 102 in the stable channel with patches for 19 vulnerabilities, including four high-severity bugs.

With the latest update, Mozilla has patched CVE-2022-34470, a high-severity use-after-free issue in nsSHistory that was triggered when navigating between XML documents, and which could lead to a potentially exploitable crash.

Use-after-free vulnerabilities can be exploited to achieve arbitrary code execution, data corruption, or denial of service, and could lead to full system compromise if combined with other flaws. Malicious websites can exploit these bugs to escape a browser’s sandbox.

CVE-2022-34468, another high-severity flaw addressed in Firefox 102, could allow for the bypass of a CSP sandbox header without `allow-scripts` by using a retargeted javascript: URI. Because of this issue, when a user clicks on a javascript: link, an iframe could run scripts without authorization.

The new Firefox release also resolves CVE-2022-34479, a Linux-specific issue that allows malicious websites to create popup windows that can be resized in such a manner that the address bar would be overlayed with web content, potentially leading to spoofing attacks.

Multiple memory safety bugs have been assigned CVE-2022-34484, including ones that “showed evidence of JavaScript prototype or memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.”

Firefox 102 also improves user privacy by mitigating query parameter tracking when navigating the internet with Enhanced Tracking Protection (ETP) strict mode enabled.

With ETP, Firefox confines cookies to the sites that created them, which prevents cross-site tracking. Courtesy of the new capability, Firefox can block specific tracking parameters that websites may be using to circumvent the privacy protections that browsers have implemented.

Additionally, Firefox 102 handles audio decoding in a separate process that features stricter sandboxing, to enhance process isolation.

Related: Emergency Firefox Update Patches Two Actively Exploited Zero-Day Vulnerabilities

Related: New Firefox Feature Ups the Ante Against Cookie-Based Tracking

Related: Google Patches 14 Vulnerabilities With Release of Chrome 103

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content


Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...


Apple has released updates for macOS, iOS and Safari and they all include a WebKit patch for a zero-day vulnerability tracked as CVE-2023-23529.

Application Security

Drupal released updates that resolve four vulnerabilities in Drupal core and three plugins.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

IoT Security

Lexmark warns of a remote code execution (RCE) vulnerability impacting over 120 printer models, for which PoC code has been published.

Application Security

A CSRF vulnerability in the source control management (SCM) service Kudu could be exploited to achieve remote code execution in multiple Azure services.


Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.