Mozilla Foundation Security Advisory 2025-01
Security Vulnerabilities fixed in Firefox 134
- Announced
- January 7, 2025
- Impact
- high
- Products
- Firefox
- Fixed in
-
- Firefox 134
#CVE-2025-0244: Address bar spoofing using an invalid protocol scheme on Firefox for Android
- Reporter
- Umar Farooq
- Impact
- high
Description
When redirecting to an invalid protocol scheme, an attacker could spoof the address bar.
Note: This issue only affected Android operating systems. Other operating systems are unaffected.
References
#CVE-2025-0245: Lock screen setting bypass in Firefox Focus for Android
- Reporter
- Jurrie Overgoor
- Impact
- moderate
Description
Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed.
References
#CVE-2025-0246: Address bar spoofing using an invalid protocol scheme on Firefox for Android
- Reporter
- James Lee
- Impact
- moderate
Description
When using an invalid protocol scheme, an attacker could spoof the address bar.
Note: This issue only affected Android operating systems. Other operating systems are unaffected.
*Note: This issue is a different issue from CVE-2025-0244.
References
#CVE-2025-0237: WebChannel APIs susceptible to confused deputy attack
- Reporter
- Andrew McCreight
- Impact
- moderate
Description
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks.
References
#CVE-2025-0238: Use-after-free when breaking lines in text
- Reporter
- Irvan Kurniawan
- Impact
- moderate
Description
Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash.
References
#CVE-2025-0239: Alt-Svc ALPN validation failure when redirected
- Reporter
- Paul Gerste
- Impact
- moderate
Description
When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site.
References
#CVE-2025-0240: Compartment mismatch when parsing JavaScript JSON module
- Reporter
- Nils Bars
- Impact
- moderate
Description
Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free.
References
#CVE-2025-0241: Memory corruption when using JavaScript Text Segmentation
- Reporter
- Nils Bars
- Impact
- moderate
Description
When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash.
References
#CVE-2025-0242: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6
- Reporter
- Andrew McCreight, Tooru Fujisawa, and the Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-0243: Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
- Reporter
- Andrew Osmond and the Mozilla Fuzzing Team
- Impact
- moderate
Description
Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
References
#CVE-2025-0247: Memory safety bugs fixed in Firefox 134 and Thunderbird 134
- Reporter
- Akmat Suleimanov, Jed Davis, André Bargull, and the Mozilla Fuzzing Team
- Impact
- high
Description
Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.