FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

mozilla -- multiple vulnerabilities

Affected packages
firefox < 136.0,2
firefox-esr < 128.8,1
thunderbird < 136.0
thunderbird < 128.8
librewolf < 136.0

Details

VuXML ID 1a67144d-0d86-11f0-8542-b42e991fc52e
Discovery 2025-03-04
Entry 2025-03-30

security@mozilla.org reports:

An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8.

Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136.

When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136 and Thunderbird < 136.

Websites redirecting to a non-HTTP scheme URL could allow a website address to be spoofed for a malicious page This vulnerability affects Firefox for iOS < 136.

References

CVE Name CVE-2025-1932
CVE Name CVE-2025-1941
CVE Name CVE-2025-1942
CVE Name CVE-2025-27424
URL https://nvd.nist.gov/vuln/detail/CVE-2025-1932
URL https://nvd.nist.gov/vuln/detail/CVE-2025-1941
URL https://nvd.nist.gov/vuln/detail/CVE-2025-1942
URL https://nvd.nist.gov/vuln/detail/CVE-2025-27424