It was discovered that Firefox could be made to incorrectly accept newlines in HTTP/3 response headers. If a user were tricked into opening a specially crafted website, an attacker could exploit this to conduct header splitting attacks.
{ "availability": "No subscription required", "binaries": [ { "binary_version": "91.0.1+build1-0ubuntu0.18.04.1", "binary_name": "firefox" }, { "binary_version": "91.0.1+build1-0ubuntu0.18.04.1", "binary_name": "firefox-dev" }, { "binary_version": "91.0.1+build1-0ubuntu0.18.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "91.0.1+build1-0ubuntu0.18.04.1", "binary_name": "firefox-mozsymbols" } ] }
{ "availability": "No subscription required", "binaries": [ { "binary_version": "91.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox" }, { "binary_version": "91.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-dev" }, { "binary_version": "91.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-geckodriver" }, { "binary_version": "91.0.1+build1-0ubuntu0.20.04.1", "binary_name": "firefox-mozsymbols" } ] }