Mozilla has pushed out-of-band software program updates to its Firefox web browser to include two large-impact security vulnerabilities, equally of which it claims are currently being actively exploited in the wild.
Tracked as CVE-2022-26485 and CVE-2022-26486, the zero-working day flaws have been explained as use-after-free of charge issues impacting the Extensible Stylesheet Language Transformations (XSLT) parameter processing and the WebGPU inter-procedure conversation (IPC) Framework.

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.
Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).
➤ Activate Your Coupon Code
XSLT is an XML-based language applied for the conversion of XML files into web webpages or PDF paperwork, whilst WebGPU is an rising web regular that’s been billed as a successor to the recent WebGL JavaScript graphics library.
The description of the two flaws is down below –
- CVE-2022-26485 – Taking away an XSLT parameter for the duration of processing could guide to an exploitable use-after-cost-free
- CVE-2022-26486 – An unpredicted information in the WebGPU IPC framework could guide to a use-just after-free of charge and exploitable sandbox escape
Use-after-free bugs – which could be exploited to corrupt valid information and execute arbitrary code on compromised units – stem predominantly from a “confusion about which element of the software is accountable for releasing the memory.”
Mozilla acknowledged that “We have experienced reports of attacks in the wild” weaponizing the two vulnerabilities but did not share any specialized particulars linked to the intrusions or the identities of the malicious actors exploiting them.
Security scientists Wang Gang, Liu Jialei, Du Sihang, Huang Yi, and Yang Kang of Qihoo 360 ATA have been credited with discovering and reporting the shortcomings.
In light of active exploitation of the flaws, users are suggested to upgrade as soon as probable to Firefox 97..2, Firefox ESR 91.6.1, Firefox for Android 97.3., Aim 97.3., and Thunderbird 91.6.2.
Found this post attention-grabbing? Stick to THN on Facebook, Twitter and LinkedIn to go through a lot more exclusive material we post.
Some areas of this write-up are sourced from:
thehackernews.com