vulnerability
Rocky Linux: CVE-2025-4083: firefox (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:C/I:C/A:N) | Jul 29, 2025 | Jul 31, 2025 | Sep 9, 2025 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Sep 9, 2025
Description
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
Solutions
rocky-upgrade-firefoxrocky-upgrade-firefox-debuginforocky-upgrade-firefox-debugsourcerocky-upgrade-firefox-x11rocky-upgrade-thunderbirdrocky-upgrade-thunderbird-debuginforocky-upgrade-thunderbird-debugsource
References
- CVE-2025-4083
- https://attackerkb.com/topics/CVE-2025-4083
- CWE-653
- URL-https://errata.rockylinux.org/RLSA-2025:4443
- URL-https://errata.rockylinux.org/RLSA-2025:4458
- URL-https://errata.rockylinux.org/RLSA-2025:4460
- URL-https://errata.rockylinux.org/RLSA-2025:4797
- URL-https://errata.rockylinux.org/RLSA-2025:7428
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.