I asked chatgpt 5.1 (paid) it said:
I checked. There
is current public data for those CVEs; but whether “just disabling JIT” in Mozilla Firefox would have mitigated them isn’t clearly guaranteed for
all of them. Here’s what I found (and what remains uncertain).
What we know, and why disabling JIT
- For CVE-2025-1933, the vulnerability arises from a bug in the JIT compilation of WebAssembly i32 return values on 64-bit CPUs: the JIT might pick up leftover bits from adjacent memory, leading to corrupted or mis-typed values. NVD+1
- For CVE-2025-11153, the publicly documented issue is “JIT miscompilation in the JavaScript Engine: JIT component.” NVD+1
- For CVE-2025-13024, the issue is similarly “JIT miscompilation in the JavaScript Engine: JIT component.” cvedetails.com+1
Since all three are explicitly tied to JIT (the just-in-time compiler), disabling JIT (or preventing JIT compilation of JS / WASM) would — in principle — disable the faulty component and eliminate the attack surface exploited by those vulnerabilities.
In other words: the root cause is in JIT, so removing JIT should prevent those specific miscompilation-based attacks.
What we do
- For CVE-2025-3031, the description is “JIT optimization bug with different stack slot sizes” — again, a JIT-related flaw. Mozilla But publicly available mitigation guidance for this CVE doesn’t explicitly say “disabling JIT will mitigate.” The official fix is an update to Firefox 137, implying the maintainers considered patching safer than relying on a workaround. Mozilla
- For all these CVEs, the official mitigation advice from maintainers is to update to a patched version (e.g. Firefox 143.0.3 for CVE-11153; Firefox 145 for CVE-13024; Firefox 137 for CVE-3031) rather than to disable JIT. Mozilla+2Mozilla+2
- Disabling JIT may have unintended consequences. Many modern web-apps rely on JIT or WebAssembly for performance — disabling it might break functionality or severely degrade site behavior. Worse, even if JIT is disabled, there could be other non-JIT vulnerabilities (e.g. memory safety issues, WebGPU bugs, sandbox escapes) that remain exploitable. Indeed, the 2025 security rounds for Firefox fixed many vulnerabilities outside JIT. Mozilla+1
- There is no public “official statement by Mozilla” (that I found) saying “disabling JIT is an effective mitigation” for these specific CVEs — that means it’s not a trusted or guaranteed mitigation strategy according to vendor guidance.
My (informed) conclusion: yes — disabling JIT
If you disable JIT (and ideally WebAssembly) in Firefox on a 64-bit system, you would probably avoid exploitation of the mis-compilation bugs (CVE-1933, CVE-11153, CVE-13024, and quite possibly CVE-3031). However, you’d still be exposed to non-JIT vulnerabilities — and you’d degrade browser functionality.
If you like, I can check whether there’s a documented configuration toggle (policy / about:config) for Firefox 2025 that cleanly disables JIT + WASM (or falls back to an interpreter), and how practical that is day-to-day. Want me to dig up that info now?
****************************************************************************************************
If the above is redundant info, sorry.