Mozilla this week announced the availability of Firefox 102 in the stable channel with patches for 19 vulnerabilities, including four high-severity bugs.
With the latest update, Mozilla has patched CVE-2022-34470, a high-severity use-after-free issue in nsSHistory that was triggered when navigating between XML documents, and which could lead to a potentially exploitable crash.
Use-after-free vulnerabilities can be exploited to achieve arbitrary code execution, data corruption, or denial of service, and could lead to full system compromise if combined with other flaws. Malicious websites can exploit these bugs to escape a browser’s sandbox.
The new Firefox release also resolves CVE-2022-34479, a Linux-specific issue that allows malicious websites to create popup windows that can be resized in such a manner that the address bar would be overlayed with web content, potentially leading to spoofing attacks.
Firefox 102 also improves user privacy by mitigating query parameter tracking when navigating the internet with Enhanced Tracking Protection (ETP) strict mode enabled.
With ETP, Firefox confines cookies to the sites that created them, which prevents cross-site tracking. Courtesy of the new capability, Firefox can block specific tracking parameters that websites may be using to circumvent the privacy protections that browsers have implemented.
Additionally, Firefox 102 handles audio decoding in a separate process that features stricter sandboxing, to enhance process isolation.