OESA-2025-1635

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1635
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1635.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1635
Upstream
Published
2025-06-13T14:20:40Z
Modified
2025-08-12T05:51:46.414040Z
Summary
firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.

Security Fix(es):

Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.(CVE-2025-5263)

Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.(CVE-2025-5264)

Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox < 139, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.(CVE-2025-5266)

A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox < 139, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.(CVE-2025-5267)

Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 139, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.(CVE-2025-5268)

Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 128.11 and Thunderbird < 128.11.(CVE-2025-5269)

Database specific
{
    "severity": "Medium"
}
References

Affected packages

openEuler:22.03-LTS-SP4 / firefox

Package

Name
firefox
Purl
pkg:rpm/openEuler/firefox&distro=openEuler-22.03-LTS-SP4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
128.11.0-1.oe2203sp4

Ecosystem specific

{
    "src": [
        "firefox-128.11.0-1.oe2203sp4.src.rpm"
    ],
    "x86_64": [
        "firefox-128.11.0-1.oe2203sp4.x86_64.rpm",
        "firefox-debuginfo-128.11.0-1.oe2203sp4.x86_64.rpm",
        "firefox-debugsource-128.11.0-1.oe2203sp4.x86_64.rpm"
    ],
    "aarch64": [
        "firefox-128.11.0-1.oe2203sp4.aarch64.rpm",
        "firefox-debuginfo-128.11.0-1.oe2203sp4.aarch64.rpm",
        "firefox-debugsource-128.11.0-1.oe2203sp4.aarch64.rpm"
    ]
}