MGASA-2025-0150

Source
https://advisories.mageia.org/MGASA-2025-0150.html
Import Source
https://advisories.mageia.org/MGASA-2025-0150.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2025-0150
Related
Published
2025-05-08T18:51:21Z
Modified
2025-05-08T18:14:18Z
Summary
Updated firefox packages fix security vulnerabilities
Details

A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape, CVE-2025-4083. A vulnerability was identified in Firefox where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption, CVE-2025-4087. Memory safety bugs present in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code, CVE-2025-4091. Memory safety bug present in Firefox ESR 128.9, and Thunderbird 128.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code, CVE-2025-4093.

References
Credits

Affected packages

Mageia:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/mageia/firefox?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
128.10.0-1.mga9

Ecosystem specific

{
    "section": "core"
}

Mageia:9 / firefox-l10n

Package

Name
firefox-l10n
Purl
pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
128.10.0-1.mga9

Ecosystem specific

{
    "section": "core"
}