A process isolation vulnerability in Firefox stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird ESR < 128.10.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:4443 https://access.redhat.com/errata/RHSA-2025:4443
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:4458 https://access.redhat.com/errata/RHSA-2025:4458
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:4460 https://access.redhat.com/errata/RHSA-2025:4460
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:4753 https://access.redhat.com/errata/RHSA-2025:4753
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:4756 https://access.redhat.com/errata/RHSA-2025:4756
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:4751 https://access.redhat.com/errata/RHSA-2025:4751
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:4752 https://access.redhat.com/errata/RHSA-2025:4752