CVE-2025-14322
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
Security Fix(es):
- firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333)
- firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321)
- firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325)
- firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322)
- firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328)
- firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329)
- firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331)
- firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323)
- firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330)
- firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://access.redhat.com/errata/RHSA-2025:23034, https://access.redhat.com/security/cve/CVE-2025-14321, https://access.redhat.com/security/cve/CVE-2025-14322, https://access.redhat.com/security/cve/CVE-2025-14323, https://access.redhat.com/security/cve/CVE-2025-14324, https://access.redhat.com/security/cve/CVE-2025-14325, https://access.redhat.com/security/cve/CVE-2025-14328, https://access.redhat.com/security/cve/CVE-2025-14329, https://access.redhat.com/security/cve/CVE-2025-14330, https://access.redhat.com/security/cve/CVE-2025-14331, https://access.redhat.com/security/cve/CVE-2025-14333
