Bug 2336182 (CVE-2025-0237)

Summary: CVE-2025-0237 firefox: thunderbird: WebChannel APIs susceptible to confused deputy attack
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedCC: gotiwari, jhorak, mvyas, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
A flaw was found in Firefox. The Mozilla Foundation's Security Advisory describes the following issue: The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-01-07 17:02:20 UTC
The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6.

Comment 1 errata-xmlrpc 2025-01-08 11:32:39 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:0080 https://access.redhat.com/errata/RHSA-2025:0080

Comment 2 errata-xmlrpc 2025-01-09 06:23:49 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:0133 https://access.redhat.com/errata/RHSA-2025:0133

Comment 3 errata-xmlrpc 2025-01-09 06:29:19 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:0135 https://access.redhat.com/errata/RHSA-2025:0135

Comment 4 errata-xmlrpc 2025-01-09 06:29:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2025:0134 https://access.redhat.com/errata/RHSA-2025:0134

Comment 5 errata-xmlrpc 2025-01-09 06:30:59 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:0132 https://access.redhat.com/errata/RHSA-2025:0132

Comment 6 errata-xmlrpc 2025-01-09 06:32:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:0136 https://access.redhat.com/errata/RHSA-2025:0136

Comment 7 errata-xmlrpc 2025-01-09 06:45:38 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:0138 https://access.redhat.com/errata/RHSA-2025:0138

Comment 8 errata-xmlrpc 2025-01-09 06:45:56 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:0137 https://access.redhat.com/errata/RHSA-2025:0137

Comment 9 errata-xmlrpc 2025-01-09 07:31:51 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:0144 https://access.redhat.com/errata/RHSA-2025:0144

Comment 10 errata-xmlrpc 2025-01-09 11:08:20 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:0162 https://access.redhat.com/errata/RHSA-2025:0162