Bug 2349797 (CVE-2025-1936)

Summary: CVE-2025-1936 firefox: Adding %00 and a fake extension to a jar: URL changed the interpretation of the contents
Product: [Other] Security Response Reporter: OSIDB Bzimport <bzimport>
Component: vulnerabilityAssignee: Product Security DevOps Team <prodsec-dev>
Status: NEW --- QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: erack, gotiwari, jhorak, mvyas, tpopela
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: ---
Doc Text:
A flaw was found in Firefox. The Mozilla Foundation's Security Advisory describes the following issue: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image.
Story Points: ---
Clone Of: Environment:
Last Closed: Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description OSIDB Bzimport 2025-03-04 14:01:32 UTC
jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136 and Firefox ESR < 128.8.

Comment 1 errata-xmlrpc 2025-03-05 11:23:53 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2025:2359 https://access.redhat.com/errata/RHSA-2025:2359

Comment 2 errata-xmlrpc 2025-03-06 11:54:27 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2025:2452 https://access.redhat.com/errata/RHSA-2025:2452

Comment 3 errata-xmlrpc 2025-03-10 05:20:41 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions

Via RHSA-2025:2481 https://access.redhat.com/errata/RHSA-2025:2481

Comment 4 errata-xmlrpc 2025-03-10 05:23:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.2 Extended Update Support

Via RHSA-2025:2480 https://access.redhat.com/errata/RHSA-2025:2480

Comment 5 errata-xmlrpc 2025-03-10 05:25:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.4 Extended Update Support

Via RHSA-2025:2479 https://access.redhat.com/errata/RHSA-2025:2479

Comment 6 errata-xmlrpc 2025-03-10 06:10:23 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.6 Telecommunications Update Service

Via RHSA-2025:2485 https://access.redhat.com/errata/RHSA-2025:2485

Comment 7 errata-xmlrpc 2025-03-10 06:12:03 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service

Via RHSA-2025:2484 https://access.redhat.com/errata/RHSA-2025:2484

Comment 8 errata-xmlrpc 2025-03-10 06:13:37 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.8 Extended Update Support

Via RHSA-2025:2486 https://access.redhat.com/errata/RHSA-2025:2486

Comment 9 errata-xmlrpc 2025-03-13 06:53:34 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7 Extended Lifecycle Support

Via RHSA-2025:2699 https://access.redhat.com/errata/RHSA-2025:2699

Comment 10 errata-xmlrpc 2025-03-13 07:09:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support

Via RHSA-2025:2708 https://access.redhat.com/errata/RHSA-2025:2708