Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 948112 (CVE-2025-0237, CVE-2025-0238, CVE-2025-0239, CVE-2025-0240, CVE-2025-0241, CVE-2025-0242, CVE-2025-0243, MFSA2025-01, MFSA2025-02, MFSA2025-05)

Summary: [Tracker] Mozilla Foundation Security Advisory for January 7, 2025
Product: Gentoo Security Reporter: Christopher Fore <csfore>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: CONFIRMED ---    
Severity: normal CC: mozilla
Priority: Normal Keywords: Tracker
Version: unspecified   
Hardware: All   
OS: Linux   
URL: https://www.mozilla.org/en-US/security/advisories/
Whiteboard:
Package list:
Runtime testing required: ---
Bug Depends on: 948114, 948115, 948113    
Bug Blocks:    

Description Christopher Fore 2025-01-14 19:47:49 UTC
CVE-2025-0237:

The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks.


CVE-2025-0238:

Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash.


CVE-2025-0239:

When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site.


CVE-2025-0240:

Parsing a JavaScript module as JSON could under some circumstances cause cross-compartment access, which may result in a use-after-free.


CVE-2025-0241:

When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash.


CVE-2025-0242:

Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.


CVE-2025-0243:

Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.



Firefox 134: https://www.mozilla.org/en-US/security/advisories/mfsa2025-01/
Firefox ESR 128.6: https://www.mozilla.org/en-US/security/advisories/mfsa2025-02/
Thunderbird 134: https://www.mozilla.org/en-US/security/advisories/mfsa2025-04/
Thunderbird 128.6: https://www.mozilla.org/en-US/security/advisories/mfsa2025-05/