--===============3088496766532709223== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for MozillaFirefox
Announcement ID: SUSE-SU-2025:0056-1 Release Date: 2025-01-09T16:59:18Z Rating: important References:
* bsc#1234991
Cross-References:
* CVE-2025-0237 * CVE-2025-0238 * CVE-2025-0239 * CVE-2025-0240 * CVE-2025-0241 * CVE-2025-0242 * CVE-2025-0243
CVSS scores:
* CVE-2025-0237 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0237 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0238 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-0238 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-0239 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0239 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0240 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0240 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0242 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0242 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0243 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0243 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5 * SUSE Linux Enterprise Server 12 SP5 * SUSE Linux Enterprise Server 12 SP5 LTSS * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security * SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox fixes the following issues:
* Firefox Extended Support Release 128.6.0 ESR * Fixed: Various security fixes.
MFSA 2025-02 (bsc#1234991) * CVE-2025-0237 (bmo#1915257) WebChannel APIs susceptible to confused deputy attack * CVE-2025-0238 (bmo#1915535) Use-after- free when breaking lines * CVE-2025-0239 (bmo#1929156) Alt-Svc ALPN validation failure when redirected * CVE-2025-0240 (bmo#1929623) Compartment mismatch when parsing JavaScript JSON module * CVE-2025-0241 (bmo#1933023) Memory corruption when using JavaScript Text Segmentation * CVE-2025-0242 (bmo#1874523, bmo#1926454, bmo#1931873, bmo#1932169) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 * CVE-2025-0243 (bmo#1827142, bmo#1932783) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
* Firefox Extended Support Release 128.5.2 ESR * Fixed: Fixed a crash experienced by Windows users with Qihoo 360 Total Security Antivirus software installed (bmo#1934258)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-56=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-56=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) * MozillaFirefox-128.6.0-112.243.1 * MozillaFirefox-debuginfo-128.6.0-112.243.1 * MozillaFirefox-translations-common-128.6.0-112.243.1 * MozillaFirefox-debugsource-128.6.0-112.243.1 * SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) * MozillaFirefox-devel-128.6.0-112.243.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) * MozillaFirefox-128.6.0-112.243.1 * MozillaFirefox-debuginfo-128.6.0-112.243.1 * MozillaFirefox-translations-common-128.6.0-112.243.1 * MozillaFirefox-debugsource-128.6.0-112.243.1 * SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) * MozillaFirefox-devel-128.6.0-112.243.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0237.html * https://www.suse.com/security/cve/CVE-2025-0238.html * https://www.suse.com/security/cve/CVE-2025-0239.html * https://www.suse.com/security/cve/CVE-2025-0240.html * https://www.suse.com/security/cve/CVE-2025-0241.html * https://www.suse.com/security/cve/CVE-2025-0242.html * https://www.suse.com/security/cve/CVE-2025-0243.html * https://bugzilla.suse.com/show_bug.cgi?id=1234991
--===============3088496766532709223== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for MozillaFirefox</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0056-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-01-09T16:59:18Z</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234991">bsc#1234991</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0237.html">CVE-2025-0237</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0238.html">CVE-2025-0238</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0239.html">CVE-2025-0239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0240.html">CVE-2025-0240</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0241.html">CVE-2025-0241</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0242.html">CVE-2025-0242</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0243.html">CVE-2025-0243</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0237</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0237</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0238</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0238</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0240</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0240</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0242</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0242</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0243</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0243</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">SUSE Linux Enterprise High Performance Computing 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS</li> <li class="list-group-item">SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 12 SP5</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves seven vulnerabilities can now be installed.</p>
<h2>Description:</h2> <p>This update for MozillaFirefox fixes the following issues:</p> <ul> <li>Firefox Extended Support Release 128.6.0 ESR</li> <li>Fixed: Various security fixes.</li> </ul> <p>MFSA 2025-02 (bsc#1234991) * CVE-2025-0237 (bmo#1915257) WebChannel APIs susceptible to confused deputy attack * CVE-2025-0238 (bmo#1915535) Use-after-free when breaking lines * CVE-2025-0239 (bmo#1929156) Alt-Svc ALPN validation failure when redirected * CVE-2025-0240 (bmo#1929623) Compartment mismatch when parsing JavaScript JSON module * CVE-2025-0241 (bmo#1933023) Memory corruption when using JavaScript Text Segmentation * CVE-2025-0242 (bmo#1874523, bmo#1926454, bmo#1931873, bmo#1932169) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 * CVE-2025-0243 (bmo#1827142, bmo#1932783) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6</p> <ul> <li>Firefox Extended Support Release 128.5.2 ESR</li> <li>Fixed: Fixed a crash experienced by Windows users with Qihoo 360 Total Security Antivirus software installed (bmo#1934258)</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> SUSE Linux Enterprise Server 12 SP5 LTSS <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-56=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security <br/> <code>zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-56=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64) <ul> <li>MozillaFirefox-128.6.0-112.243.1</li> <li>MozillaFirefox-debuginfo-128.6.0-112.243.1</li> <li>MozillaFirefox-translations-common-128.6.0-112.243.1</li> <li>MozillaFirefox-debugsource-128.6.0-112.243.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 LTSS (noarch) <ul> <li>MozillaFirefox-devel-128.6.0-112.243.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64) <ul> <li>MozillaFirefox-128.6.0-112.243.1</li> <li>MozillaFirefox-debuginfo-128.6.0-112.243.1</li> <li>MozillaFirefox-translations-common-128.6.0-112.243.1</li> <li>MozillaFirefox-debugsource-128.6.0-112.243.1</li> </ul> </li> <li> SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch) <ul> <li>MozillaFirefox-devel-128.6.0-112.243.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0237.html">https://www.suse.com/security/cve/CVE-2025-0237.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0238.html">https://www.suse.com/security/cve/CVE-2025-0238.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0239.html">https://www.suse.com/security/cve/CVE-2025-0239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0240.html">https://www.suse.com/security/cve/CVE-2025-0240.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0241.html">https://www.suse.com/security/cve/CVE-2025-0241.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0242.html">https://www.suse.com/security/cve/CVE-2025-0242.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0243.html">https://www.suse.com/security/cve/CVE-2025-0243.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234991">https://bugzilla.suse.com/show_bug.cgi?id=1234991</a> </li> </ul> </div>
--===============3088496766532709223==--
|