Mozilla closes a critical security hole with Firefox 131.0.2

0-day gap

Mozilla has released a new update for its popular web browser Firefox. Version 131.0.2 fixes a critical security vulnerability that has already been actively exploited.

Mozilla has released an update for Firefox that addresses a dangerous security vulnerability. This vulnerability affects both Firefox and the Extended Support Release (ESR) versions intended for companies and organizations.

The vulnerability, known as CVE-2024-9680, is a so-called use-after-free vulnerability in the browser’s CSS animations. This type of vulnerability allows attackers to inject and execute code in the content processing process. The error was discovered by Damien Schaeffer, an expert from Eset.

Mozilla reacted quickly and released version 131.0.2 of Firefox to close the gap. ESR versions 115.16.1 and 128.3.1 have also been updated to protect users. The Tor Browser, which is based on Firefox ESR 115.16, has also received an updateto fix the security vulnerability.

FAQ section

What is the CVE-2024-9680 vulnerability?

A critical use-after-free gap in CSS animations.

How can I update Firefox?

Via the “About Firefox” menu or by manual download.

Which versions are affected?

Firefox 131 and ESR versions 115.16.1 and 128.3.1.

Is Tor Browser safe?

Yes, after the update the Tor Browser is also protected.

Are there new features in Firefox 131.0.2?

No, the update focuses on security improvements.

Source: www.connect.de