Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. %if 0 %global mozdebugprefix /lib/debug %global mozdebugdir /lib/debug/ %global unamem %(uname -m) %global symbolsfilename -.en-US.-%(uname.crashreporter-symbols.zip %global symbolsfilepath /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip %global _finddebuginfoopts -p /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip -o debugcrashreporter.list %global crashreporterpkg_name mozilla-crashreporter--debuginfo
Security Fix(es):
JavaScript code running while transforming a document with the XSLTProcessor could lead to a use-after-free. This vulnerability affects Firefox < 137, Firefox ESR < 115.22, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.(CVE-2025-3028)
A crafted URL containing specific Unicode characters could have hidden the true origin of the page, resulting in a potential spoofing attack. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.(CVE-2025-3029)
Memory safety bugs present in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 137, Firefox ESR < 128.9, Thunderbird < 137, and Thunderbird < 128.9.(CVE-2025-3030)
{ "severity": "High" }
{ "src": [ "firefox-128.9.0-1.oe2203sp4.src.rpm" ], "x86_64": [ "firefox-128.9.0-1.oe2203sp4.x86_64.rpm", "firefox-debuginfo-128.9.0-1.oe2203sp4.x86_64.rpm", "firefox-debugsource-128.9.0-1.oe2203sp4.x86_64.rpm" ], "aarch64": [ "firefox-128.9.0-1.oe2203sp4.aarch64.rpm", "firefox-debuginfo-128.9.0-1.oe2203sp4.aarch64.rpm", "firefox-debugsource-128.9.0-1.oe2203sp4.aarch64.rpm" ] }