CVE Vulnerabilities

CVE-2025-9182

Uncontrolled Resource Consumption

Published: Aug 19, 2025 | Modified: Aug 21, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
3.4 LOW
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N
Ubuntu
MEDIUM

Denial-of-service due to out-of-memory in the Graphics: WebRender component. This vulnerability affects Firefox < 142, Firefox ESR < 140.2, Thunderbird < 142, and Thunderbird < 140.2.

Weakness

The product does not properly control the allocation and maintenance of a limited resource.

Affected Software

Name Vendor Start Version End Version
Firefox Mozilla * 140.2.0 (excluding)
Firefox Mozilla * 142.0 (excluding)
Thunderbird Mozilla * 140.2.0 (excluding)
Thunderbird Mozilla * 142.0 (excluding)
Red Hat Enterprise Linux 10 RedHat firefox-0:128.14.0-2.el10_0 *
Red Hat Enterprise Linux 10 RedHat thunderbird-0:128.14.0-3.el10_0 *
Red Hat Enterprise Linux 7 Extended Lifecycle Support RedHat firefox-0:128.14.0-2.el7_9 *
Red Hat Enterprise Linux 8 RedHat firefox-0:128.14.0-2.el8_10 *
Red Hat Enterprise Linux 8 RedHat thunderbird-0:128.14.0-3.el8_10 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat firefox-0:128.14.0-2.el8_2 *
Red Hat Enterprise Linux 8.2 Advanced Update Support RedHat thunderbird-0:128.14.0-3.el8_2 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat firefox-0:128.14.0-2.el8_4 *
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support RedHat thunderbird-0:128.14.0-3.el8_4 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat firefox-0:128.14.0-2.el8_4 *
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On RedHat thunderbird-0:128.14.0-3.el8_4 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat firefox-0:128.14.0-2.el8_6 *
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support RedHat thunderbird-0:128.14.0-3.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat firefox-0:128.14.0-2.el8_6 *
Red Hat Enterprise Linux 8.6 Telecommunications Update Service RedHat thunderbird-0:128.14.0-3.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat firefox-0:128.14.0-2.el8_6 *
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions RedHat thunderbird-0:128.14.0-3.el8_6 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat firefox-0:128.14.0-2.el8_8 *
Red Hat Enterprise Linux 8.8 Telecommunications Update Service RedHat thunderbird-0:128.14.0-3.el8_8 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat firefox-0:128.14.0-2.el8_8 *
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions RedHat thunderbird-0:128.14.0-3.el8_8 *
Red Hat Enterprise Linux 9 RedHat firefox-0:128.14.0-2.el9_6 *
Red Hat Enterprise Linux 9 RedHat thunderbird-0:128.14.0-3.el9_6 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat firefox-0:128.14.0-2.el9_0 *
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions RedHat thunderbird-0:128.14.0-3.el9_0 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat firefox-0:128.14.0-2.el9_2 *
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions RedHat thunderbird-0:128.14.0-3.el9_2 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat firefox-0:128.14.0-2.el9_4 *
Red Hat Enterprise Linux 9.4 Extended Update Support RedHat thunderbird-0:128.14.0-3.el9_4 *
Mozjs102 Ubuntu esm-apps/noble *
Mozjs102 Ubuntu jammy *
Mozjs102 Ubuntu noble *
Mozjs115 Ubuntu devel *
Mozjs115 Ubuntu noble *
Mozjs115 Ubuntu plucky *
Mozjs52 Ubuntu esm-apps/focal *
Mozjs52 Ubuntu esm-infra/bionic *
Mozjs68 Ubuntu esm-infra/focal *
Mozjs78 Ubuntu esm-apps/jammy *
Mozjs78 Ubuntu jammy *
Mozjs91 Ubuntu jammy *
Thunderbird Ubuntu jammy *

Potential Mitigations

  • Mitigation of resource exhaustion attacks requires that the target system either:

  • The first of these solutions is an issue in itself though, since it may allow attackers to prevent the use of the system by a particular valid user. If the attacker impersonates the valid user, they may be able to prevent the user from accessing the server in question.

  • The second solution is simply difficult to effectively institute – and even when properly done, it does not provide a full solution. It simply makes the attack require more resources on the part of the attacker.

References