Описание
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. This only affects Firefox on Windows. Other operating systems are unaffected. This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
Отчет
This vulnerability is specific to the Windows operating system and therefore does not affect any currently supported Red Hat products.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | firefox | Not affected | ||
Red Hat Enterprise Linux 7 | firefox | Not affected | ||
Red Hat Enterprise Linux 8 | firefox | Not affected | ||
Red Hat Enterprise Linux 9 | firefox | Not affected | ||
Red Hat Enterprise Linux 9 | firefox:flatpak/firefox | Not affected |
Показывать по
Дополнительная информация
Связанные уязвимости
Following the recent Chrome sandbox escape (CVE-2025-2783), various Firefox developers identified a similar pattern in our IPC code. A compromised child process could cause the parent process to return an unintentionally powerful handle, leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
Following the recent Chrome sandbox escape (CVE-2025-2783), various Fi ...
Following the sandbox escape in CVE-2025-2783, various Firefox developers identified a similar pattern in our IPC code. Attackers were able to confuse the parent process into leaking handles to unprivileged child processes leading to a sandbox escape. The original vulnerability was being exploited in the wild. *This only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox < 136.0.4, Firefox ESR < 128.8.1, and Firefox ESR < 115.21.1.
Уязвимость механизма межпроцессорного взаимодействия (IPC) браузера Mozilla Firefox, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код