OESA-2025-1720

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-1720
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-1720.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-1720
Upstream
Published
2025-07-04T14:42:52Z
Modified
2025-08-12T05:52:27.777552Z
Summary
firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. %if 0 %global mozdebugprefix /lib/debug %global mozdebugdir /lib/debug/ %global unamem %(uname -m) %global symbolsfilename -.en-US.-%(uname.crashreporter-symbols.zip %global symbolsfilepath /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip %global _finddebuginfoopts -p /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip -o debugcrashreporter.list %global crashreporterpkg_name mozilla-crashreporter--debuginfo

Security Fix(es):

A vulnerability was found in Mozilla Firefox up to 139 (Web Browser). It has been rated as critical.Using CWE to declare the problem leads to CWE-416. Referencing memory after it has been freed can cause a program to crash, use unexpected values, or execute code.Impacted is confidentiality, integrity, and availability.Upgrading to version 140 eliminates this vulnerability.(CVE-2025-6424)

An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.(CVE-2025-6425)

Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an embed tag. This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12.(CVE-2025-6429)

When a file download is specified via the Content-Disposition header, that directive would be ignored if the file was included via a &amp;lt;embed&amp;gt; or &amp;lt;object&amp;gt; tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12.(CVE-2025-6430)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP1 / firefox

Package

Name
firefox
Purl
pkg:rpm/openEuler/firefox&distro=openEuler-24.03-LTS-SP1

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
128.12.0-1.oe2403sp1

Ecosystem specific

{
    "src": [
        "firefox-128.12.0-1.oe2403sp1.src.rpm"
    ],
    "x86_64": [
        "firefox-128.12.0-1.oe2403sp1.x86_64.rpm",
        "firefox-debuginfo-128.12.0-1.oe2403sp1.x86_64.rpm",
        "firefox-debugsource-128.12.0-1.oe2403sp1.x86_64.rpm"
    ],
    "aarch64": [
        "firefox-128.12.0-1.oe2403sp1.aarch64.rpm",
        "firefox-debuginfo-128.12.0-1.oe2403sp1.aarch64.rpm",
        "firefox-debugsource-128.12.0-1.oe2403sp1.aarch64.rpm"
    ]
}