Firefox 140 Launches with Critical Code Execution Bug Fix – Update Now

Firefox 140 Launches with Critical Code Execution Bug Fix – Update Now

Mozilla has officially released Firefox 140, marking a significant update that addresses multiple security vulnerabilities, including a critical code execution flaw.

Users are strongly urged to update their browsers immediately to protect against potential exploits targeting these newly patched weaknesses.

Critical Security Fixes in Firefox 140

The highlight of Firefox 140 is the resolution of high-severity memory safety bugs, including a critical use-after-free vulnerability in the FontFaceSet component.

– Advertisement –

This flaw could allow attackers to execute arbitrary code on a victim’s machine, posing a major risk to user security.

In total, Firefox 140 patches 13 security vulnerabilities, with two classified as high-severity memory safety issues.

These include the aforementioned use-after-free bug and other memory corruption defects that could be exploited for remote code execution.

Mozilla’s security team notes that while there is no evidence these bugs have been exploited in the wild, the risk is substantial enough to warrant immediate action from users.

Additional Features and Improvements

Beyond security, Firefox 140 introduces several usability and performance enhancements.

The update brings improvements to the vertical tabs feature, enabling users to resize the pinned section and manage visible tabs more efficiently.

A new “Unload Tab” option allows users to pause background activity for inactive tabs, reducing memory and CPU usage.

Other updates include expanded address autofill support, a built-in Arabic spellcheck dictionary, and a streamlined New Tab interface.

Below is a table summarizing the key vulnerabilities addressed in this release:

CVE Impact Description
CVE-2025-6424 High Exploitable crash due to use-after-free bug
CVE-2025-6425 Moderate Persistent UUID could identify browser across modes
CVE-2025-6426 Moderate No warning before opening terminal files, macOS only
CVE-2025-6427 Moderate Attacker could bypass CSP connect-src directive
CVE-2025-6428 Moderate Android version followed malicious URLs in querystring, potential phishing
CVE-2025-6429 Moderate URL parsing flaw could bypass domain embedding restrictions
CVE-2025-6430 Moderate Ignored header could lead to cross-site scripting
CVE-2025-6436 High Memory corruption could allow arbitrary code execution

Mozilla has not reported any active exploitation of these vulnerabilities but emphasizes the importance of updating to Firefox 140 as soon as possible.

The patch is available for all supported platforms, including Windows, macOS, Linux, and Android. Users of Firefox ESR (Extended Support Release) should also update to the latest version for continued protection.

To update, users can navigate to the browser’s menu, select “Help,” then “About Firefox,” and follow the prompts to install the latest security updates.

Find this News Interesting! Follow us on Google News, LinkedIn, and X to Get Instant Updates


Source link