CVE Vulnerabilities

CVE-2025-9182

Uncontrolled Resource Consumption

Published: Aug 19, 2025 | Modified: Oct 30, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
3.4 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Denial-of-service due to out-of-memory in the Graphics: WebRender component. This vulnerability affects Firefox < 142, Firefox ESR < 140.2, Thunderbird < 142, and Thunderbird < 140.2.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

NameVendorStart VersionEnd Version
FirefoxMozilla*140.2.0 (excluding)
FirefoxMozilla*142.0 (excluding)
ThunderbirdMozilla*140.2.0 (excluding)
ThunderbirdMozilla*142.0 (excluding)
Red Hat Enterprise Linux 10RedHatfirefox-0:128.14.0-2.el10_0*
Red Hat Enterprise Linux 10RedHatthunderbird-0:128.14.0-3.el10_0*
Red Hat Enterprise Linux 7 Extended Lifecycle SupportRedHatfirefox-0:128.14.0-2.el7_9*
Red Hat Enterprise Linux 8RedHatfirefox-0:128.14.0-2.el8_10*
Red Hat Enterprise Linux 8RedHatthunderbird-0:128.14.0-3.el8_10*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatfirefox-0:128.14.0-2.el8_2*
Red Hat Enterprise Linux 8.2 Advanced Update SupportRedHatthunderbird-0:128.14.0-3.el8_2*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatfirefox-0:128.14.0-2.el8_4*
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update SupportRedHatthunderbird-0:128.14.0-3.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatfirefox-0:128.14.0-2.el8_4*
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-OnRedHatthunderbird-0:128.14.0-3.el8_4*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatfirefox-0:128.14.0-2.el8_6*
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update SupportRedHatthunderbird-0:128.14.0-3.el8_6*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatfirefox-0:128.14.0-2.el8_6*
Red Hat Enterprise Linux 8.6 Telecommunications Update ServiceRedHatthunderbird-0:128.14.0-3.el8_6*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatfirefox-0:128.14.0-2.el8_6*
Red Hat Enterprise Linux 8.6 Update Services for SAP SolutionsRedHatthunderbird-0:128.14.0-3.el8_6*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatfirefox-0:128.14.0-2.el8_8*
Red Hat Enterprise Linux 8.8 Telecommunications Update ServiceRedHatthunderbird-0:128.14.0-3.el8_8*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatfirefox-0:128.14.0-2.el8_8*
Red Hat Enterprise Linux 8.8 Update Services for SAP SolutionsRedHatthunderbird-0:128.14.0-3.el8_8*
Red Hat Enterprise Linux 9RedHatfirefox-0:128.14.0-2.el9_6*
Red Hat Enterprise Linux 9RedHatthunderbird-0:128.14.0-3.el9_6*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatfirefox-0:128.14.0-2.el9_0*
Red Hat Enterprise Linux 9.0 Update Services for SAP SolutionsRedHatthunderbird-0:128.14.0-3.el9_0*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatfirefox-0:128.14.0-2.el9_2*
Red Hat Enterprise Linux 9.2 Update Services for SAP SolutionsRedHatthunderbird-0:128.14.0-3.el9_2*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatfirefox-0:128.14.0-2.el9_4*
Red Hat Enterprise Linux 9.4 Extended Update SupportRedHatthunderbird-0:128.14.0-3.el9_4*
Mozjs102Ubuntuesm-apps/noble*
Mozjs102Ubuntujammy*
Mozjs102Ubuntunoble*
Mozjs115Ubuntunoble*
Mozjs115Ubuntuplucky*
Mozjs52Ubuntuesm-apps/focal*
Mozjs52Ubuntuesm-infra/bionic*
Mozjs68Ubuntuesm-infra/focal*
Mozjs78Ubuntuesm-apps/jammy*
Mozjs78Ubuntujammy*
Mozjs91Ubuntujammy*
ThunderbirdUbuntujammy*

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References