CVE-2025-1012
Description
A race during concurrent delazification could have led to a use-after-free. This vulnerability was fixed in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
A race condition in Firefox's concurrent delazification causes a use-after-free, potentially exploitable for code execution, fixed in Firefox 135 and Thunderbird 135.
Vulnerability
Details
CVE-2025-1012 is a use-after-free vulnerability in Mozilla Firefox and Thunderbird caused by a race condition during concurrent delazification of JavaScript code. The bug was discovered by Nils Bars and reported via Bugzilla [1]. AddressSanitizer output confirms a heap-use-after-free read in the token stream during parsing [1].
Exploitation
An attacker can trigger this race by delivering specially crafted web content that forces concurrent delazification operations. No authentication is required; the vulnerability is remotely exploitable. In Thunderbird, scripting is disabled when reading email, so exploitation through email is unlikely, but it may be possible through other features that display remote web content [2][3].
Impact
Successful exploitation could lead to a potentially exploitable crash, and in the worst case, arbitrary code execution. The vulnerability is rated High severity with a CVSS v3 score of 7.5.
Mitigation
Mozilla has addressed this issue in Firefox 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 128.7, and Thunderbird 135 [2][3][4]. Users are advised to update their software to the latest versions.
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
34cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*+ 2 more
- cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*range: <135.0
- cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*range: <115.20.0
- (no CPE)range: <135
cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*+ 2 more
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*range: <135.0
- cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*range: >=128.0.1,<128.7.0
- (no CPE)range: <135
- osv-coords28 versionspkg:apk/chainguard/firefoxpkg:apk/chainguard/firefox-esrpkg:apk/wolfi/firefoxpkg:rpm/almalinux/firefoxpkg:rpm/almalinux/firefox-x11pkg:rpm/almalinux/thunderbirdpkg:rpm/opensuse/firefox-esr&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Tumbleweedpkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Tumbleweedpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%207.1pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP6pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP3-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSSpkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP3pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP6pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP6
< 135.0-r0+ 27 more
- (no CPE)range: < 135.0-r0
- (no CPE)range: < 128.7.0-r0
- (no CPE)range: < 135.0-r0
- (no CPE)range: < 128.7.0-1.el9_5
- (no CPE)range: < 128.7.0-1.el9_5
- (no CPE)range: < 128.7.0-1.el9_5.alma.1
- (no CPE)range: < 128.7.0-1.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 135.0-1.1
- (no CPE)range: < 128.7.0-150200.8.200.1
- (no CPE)range: < 128.7.0-1.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-112.246.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-150200.152.170.1
- (no CPE)range: < 128.7.0-112.246.1
- (no CPE)range: < 128.7.0-150200.8.200.1
- (no CPE)range: < 128.7.0-150200.8.200.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
8- www.mozilla.org/security/advisories/mfsa2025-07/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-08/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-09/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-10/nvdVendor Advisory
- www.mozilla.org/security/advisories/mfsa2025-11/nvdVendor Advisory
- bugzilla.mozilla.org/show_bug.cginvdPermissions Required
- lists.debian.org/debian-lts-announce/2025/02/msg00005.htmlnvd
- lists.debian.org/debian-lts-announce/2025/02/msg00006.htmlnvd
News mentions
0No linked articles in our index yet.