Описание
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.
Пакеты
Пакет | Статус | Версия исправления | Релиз | Тип |
---|---|---|---|---|
firefox | fixed | 137.0-1 | package | |
firefox-esr | fixed | 128.9.0esr-1 | package | |
thunderbird | fixed | 1:128.9.0esr-1 | package |
Примечания
https://www.mozilla.org/en-US/security/advisories/mfsa2025-20/#CVE-2025-3028
https://www.mozilla.org/en-US/security/advisories/mfsa2025-22/#CVE-2025-3028
https://www.mozilla.org/en-US/security/advisories/mfsa2025-24/#CVE-2025-3028
https://project-zero.issues.chromium.org/issues/389079450
EPSS
Связанные уязвимости
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.
EPSS