Vulnerabilities affecting this package (0)
| Vulnerability |
Summary |
Fixed by |
|
This package is not known to be affected by vulnerabilities.
|
Vulnerabilities fixed by this package (9)
| Vulnerability |
Summary |
Aliases |
|
VCID-4gsx-puz4-a3f1
|
Use-after-free in MediaTrackGraphImpl::GetInstance()
|
CVE-2025-11708
|
|
VCID-59wd-mtjt-4ban
|
Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
|
CVE-2025-11714
|
|
VCID-6jw1-pere-ruee
|
Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.
|
CVE-2025-11715
|
|
VCID-ey7f-q2ks-g3fr
|
Memory safety bug present in Firefox 143 and Thunderbird 143. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code.
|
CVE-2025-11721
|
|
VCID-kkgh-a9hg-fud8
|
A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process.
|
CVE-2025-11710
|
|
VCID-pzsj-b4vv-63g2
|
When the address bar was hidden due to scrolling on Android, a malicious page could create a fake address bar to fool the user in response to a visibilitychange event
|
CVE-2025-11718
|
|
VCID-qeh2-jn2v-9ug7
|
A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures.
|
CVE-2025-11709
|
|
VCID-t9cw-yjar-ckfd
|
A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header.
|
CVE-2025-11712
|
|
VCID-tgsj-hp8b-27f9
|
There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable.
|
CVE-2025-11711
|