Impact
A race condition that occurs during concurrent delazification can trigger a use‑after‑free in the rendering engine. This flaw permits the application to access memory that has already been freed, which could lead to memory corruption or unintended data modification. The vulnerability is classified as a memory‑management defect, identified by CWE‑416.
Affected Systems
Mozilla Firefox versions up to 134 (including all Standard and ESR editions below 115.20 and below 128.7) and Mozilla Thunderbird versions below 128.7 and 135. The affected binaries are also distributed in several Red Hat Enterprise Linux environments, notably versions 8 and 9 and their extended service releases (AUS, EUS, TUS, ELS).
Risk and Exploitability
The CVSS score of 9.8 signals a critical severity. The EPSS score is under 1 %, indicating that exploitation activity has been very low so far, and the vulnerability is not listed in the CISA KEV catalog. The description does not detail a usable exploit or a confirmed attack vector, so the risk remains theoretical but the potential impact would be high if exploited.
OpenCVE Enrichment
Debian DLA
Debian DSA
EUVD
Ubuntu USN