opensuse-su-2025:15371-1
Vulnerability from csaf_opensuse
Published
2025-07-23 00:00
Modified
2025-07-23 00:00
Summary
firefox-esr-140.1.0-1.1 on GA media
Notes
Title of the patch
firefox-esr-140.1.0-1.1 on GA media
Description of the patch
These are all security issues fixed in the firefox-esr-140.1.0-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15371
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "firefox-esr-140.1.0-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the firefox-esr-140.1.0-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15371", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15371-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6427 page", "url": "https://www.suse.com/security/cve/CVE-2025-6427/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6428 page", "url": "https://www.suse.com/security/cve/CVE-2025-6428/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6431 page", "url": "https://www.suse.com/security/cve/CVE-2025-6431/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6432 page", "url": "https://www.suse.com/security/cve/CVE-2025-6432/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6433 page", "url": "https://www.suse.com/security/cve/CVE-2025-6433/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6434 page", "url": "https://www.suse.com/security/cve/CVE-2025-6434/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6435 page", "url": "https://www.suse.com/security/cve/CVE-2025-6435/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-6436 page", "url": "https://www.suse.com/security/cve/CVE-2025-6436/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8027 page", "url": "https://www.suse.com/security/cve/CVE-2025-8027/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8028 page", "url": "https://www.suse.com/security/cve/CVE-2025-8028/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8029 page", "url": "https://www.suse.com/security/cve/CVE-2025-8029/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8030 page", "url": "https://www.suse.com/security/cve/CVE-2025-8030/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8031 page", "url": "https://www.suse.com/security/cve/CVE-2025-8031/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8032 page", "url": "https://www.suse.com/security/cve/CVE-2025-8032/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8033 page", "url": "https://www.suse.com/security/cve/CVE-2025-8033/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8034 page", "url": "https://www.suse.com/security/cve/CVE-2025-8034/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8035 page", "url": "https://www.suse.com/security/cve/CVE-2025-8035/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8036 page", "url": "https://www.suse.com/security/cve/CVE-2025-8036/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8037 page", "url": "https://www.suse.com/security/cve/CVE-2025-8037/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8038 page", "url": "https://www.suse.com/security/cve/CVE-2025-8038/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8039 page", "url": "https://www.suse.com/security/cve/CVE-2025-8039/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8040 page", "url": "https://www.suse.com/security/cve/CVE-2025-8040/" } ], "title": "firefox-esr-140.1.0-1.1 on GA media", "tracking": { "current_release_date": "2025-07-23T00:00:00Z", "generator": { "date": "2025-07-23T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15371-1", "initial_release_date": "2025-07-23T00:00:00Z", "revision_history": [ { "date": "2025-07-23T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "firefox-esr-140.1.0-1.1.aarch64", "product": { "name": "firefox-esr-140.1.0-1.1.aarch64", "product_id": "firefox-esr-140.1.0-1.1.aarch64" } }, { "category": "product_version", "name": "firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "product": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "product_id": "firefox-esr-branding-upstream-140.1.0-1.1.aarch64" } }, { "category": "product_version", "name": "firefox-esr-translations-common-140.1.0-1.1.aarch64", "product": { "name": "firefox-esr-translations-common-140.1.0-1.1.aarch64", "product_id": "firefox-esr-translations-common-140.1.0-1.1.aarch64" } }, { "category": "product_version", "name": "firefox-esr-translations-other-140.1.0-1.1.aarch64", "product": { "name": "firefox-esr-translations-other-140.1.0-1.1.aarch64", "product_id": "firefox-esr-translations-other-140.1.0-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "firefox-esr-140.1.0-1.1.ppc64le", "product": { "name": "firefox-esr-140.1.0-1.1.ppc64le", "product_id": "firefox-esr-140.1.0-1.1.ppc64le" } }, { "category": "product_version", "name": "firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "product": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "product_id": "firefox-esr-branding-upstream-140.1.0-1.1.ppc64le" } }, { "category": "product_version", "name": "firefox-esr-translations-common-140.1.0-1.1.ppc64le", "product": { "name": "firefox-esr-translations-common-140.1.0-1.1.ppc64le", "product_id": "firefox-esr-translations-common-140.1.0-1.1.ppc64le" } }, { "category": "product_version", "name": "firefox-esr-translations-other-140.1.0-1.1.ppc64le", "product": { "name": "firefox-esr-translations-other-140.1.0-1.1.ppc64le", "product_id": "firefox-esr-translations-other-140.1.0-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "firefox-esr-140.1.0-1.1.s390x", "product": { "name": "firefox-esr-140.1.0-1.1.s390x", "product_id": "firefox-esr-140.1.0-1.1.s390x" } }, { "category": "product_version", "name": "firefox-esr-branding-upstream-140.1.0-1.1.s390x", "product": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.s390x", "product_id": "firefox-esr-branding-upstream-140.1.0-1.1.s390x" } }, { "category": "product_version", "name": "firefox-esr-translations-common-140.1.0-1.1.s390x", "product": { "name": "firefox-esr-translations-common-140.1.0-1.1.s390x", "product_id": "firefox-esr-translations-common-140.1.0-1.1.s390x" } }, { "category": "product_version", "name": "firefox-esr-translations-other-140.1.0-1.1.s390x", "product": { "name": "firefox-esr-translations-other-140.1.0-1.1.s390x", "product_id": "firefox-esr-translations-other-140.1.0-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "firefox-esr-140.1.0-1.1.x86_64", "product": { "name": "firefox-esr-140.1.0-1.1.x86_64", "product_id": "firefox-esr-140.1.0-1.1.x86_64" } }, { "category": "product_version", "name": "firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "product": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "product_id": "firefox-esr-branding-upstream-140.1.0-1.1.x86_64" } }, { "category": "product_version", "name": "firefox-esr-translations-common-140.1.0-1.1.x86_64", "product": { "name": "firefox-esr-translations-common-140.1.0-1.1.x86_64", "product_id": "firefox-esr-translations-common-140.1.0-1.1.x86_64" } }, { "category": "product_version", "name": "firefox-esr-translations-other-140.1.0-1.1.x86_64", "product": { "name": "firefox-esr-translations-other-140.1.0-1.1.x86_64", "product_id": "firefox-esr-translations-other-140.1.0-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-140.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64" }, "product_reference": "firefox-esr-140.1.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-140.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le" }, "product_reference": "firefox-esr-140.1.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-140.1.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x" }, "product_reference": "firefox-esr-140.1.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-140.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64" }, "product_reference": "firefox-esr-140.1.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64" }, "product_reference": "firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le" }, "product_reference": "firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x" }, "product_reference": "firefox-esr-branding-upstream-140.1.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-branding-upstream-140.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64" }, "product_reference": "firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-common-140.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64" }, "product_reference": "firefox-esr-translations-common-140.1.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-common-140.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le" }, "product_reference": "firefox-esr-translations-common-140.1.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-common-140.1.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x" }, "product_reference": "firefox-esr-translations-common-140.1.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-common-140.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64" }, "product_reference": "firefox-esr-translations-common-140.1.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-other-140.1.0-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64" }, "product_reference": "firefox-esr-translations-other-140.1.0-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-other-140.1.0-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le" }, "product_reference": "firefox-esr-translations-other-140.1.0-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-other-140.1.0-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x" }, "product_reference": "firefox-esr-translations-other-140.1.0-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "firefox-esr-translations-other-140.1.0-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" }, "product_reference": "firefox-esr-translations-other-140.1.0-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-6427", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6427" } ], "notes": [ { "category": "general", "text": "An attacker was able to bypass the `connect-src` directive of a Content Security Policy by manipulating subdocuments. This would have also hidden the connections from the Network tab in Devtools. This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6427", "url": "https://www.suse.com/security/cve/CVE-2025-6427" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6427", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6427" }, { "cve": "CVE-2025-6428", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6428" } ], "notes": [ { "category": "general", "text": "When a URL was provided in a link querystring parameter, Firefox for Android would follow that URL instead of the correct URL, potentially leading to phishing attacks.\n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6428", "url": "https://www.suse.com/security/cve/CVE-2025-6428" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6428", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6428" }, { "cve": "CVE-2025-6431", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6431" } ], "notes": [ { "category": "general", "text": "When a link can be opened in an external application, Firefox for Android will, by default, prompt the user before doing so. An attacker could have bypassed this prompt, potentially exposing the user to security vulnerabilities or privacy leaks in external applications. \n*This bug only affects Firefox for Android. Other versions of Firefox are unaffected.* This vulnerability affects Firefox \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6431", "url": "https://www.suse.com/security/cve/CVE-2025-6431" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6431", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6431" }, { "cve": "CVE-2025-6432", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6432" } ], "notes": [ { "category": "general", "text": "When Multi-Account Containers was enabled, DNS requests could have bypassed a SOCKS proxy when the domain name was invalid or the SOCKS proxy was not responding. This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6432", "url": "https://www.suse.com/security/cve/CVE-2025-6432" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6432", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.2, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6432" }, { "cve": "CVE-2025-6433", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6433" } ], "notes": [ { "category": "general", "text": "If a user visited a webpage with an invalid TLS certificate, and granted an exception, the webpage was able to provide a WebAuthn challenge that the user would be prompted to complete. This is in violation of the WebAuthN spec which requires \"a secure transport established without errors\". This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6433", "url": "https://www.suse.com/security/cve/CVE-2025-6433" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6433", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6433" }, { "cve": "CVE-2025-6434", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6434" } ], "notes": [ { "category": "general", "text": "The exception page for the HTTPS-Only feature, displayed when a website is opened via HTTP, lacked an anti-clickjacking delay, potentially allowing an attacker to trick a user into granting an exception and loading a webpage over HTTP. This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6434", "url": "https://www.suse.com/security/cve/CVE-2025-6434" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6434", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6434" }, { "cve": "CVE-2025-6435", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6435" } ], "notes": [ { "category": "general", "text": "If a user saved a response from the Network tab in Devtools using the Save As context menu option, that file may not have been saved with the `.download` file extension. This could have led to the user inadvertently running a malicious executable. This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6435", "url": "https://www.suse.com/security/cve/CVE-2025-6435" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6435", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6435" }, { "cve": "CVE-2025-6436", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-6436" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox 139 and Thunderbird 139. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 140 and Thunderbird \u003c 140.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-6436", "url": "https://www.suse.com/security/cve/CVE-2025-6436" }, { "category": "external", "summary": "SUSE Bug 1244670 for CVE-2025-6436", "url": "https://bugzilla.suse.com/1244670" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-6436" }, { "cve": "CVE-2025-8027", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8027" } ], "notes": [ { "category": "general", "text": "On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 115.26, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8027", "url": "https://www.suse.com/security/cve/CVE-2025-8027" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8027", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8027" }, { "cve": "CVE-2025-8028", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8028" } ], "notes": [ { "category": "general", "text": "On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 115.26, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8028", "url": "https://www.suse.com/security/cve/CVE-2025-8028" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8028", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.6, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8028" }, { "cve": "CVE-2025-8029", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8029" } ], "notes": [ { "category": "general", "text": "Firefox executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8029", "url": "https://www.suse.com/security/cve/CVE-2025-8029" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8029", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8029" }, { "cve": "CVE-2025-8030", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8030" } ], "notes": [ { "category": "general", "text": "Insufficient escaping in the \"Copy as cURL\" feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8030", "url": "https://www.suse.com/security/cve/CVE-2025-8030" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8030", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8030" }, { "cve": "CVE-2025-8031", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8031" } ], "notes": [ { "category": "general", "text": "The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8031", "url": "https://www.suse.com/security/cve/CVE-2025-8031" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8031", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8031" }, { "cve": "CVE-2025-8032", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8032" } ], "notes": [ { "category": "general", "text": "XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8032", "url": "https://www.suse.com/security/cve/CVE-2025-8032" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8032", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8032" }, { "cve": "CVE-2025-8033", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8033" } ], "notes": [ { "category": "general", "text": "The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 115.26, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8033", "url": "https://www.suse.com/security/cve/CVE-2025-8033" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8033", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8033" }, { "cve": "CVE-2025-8034", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8034" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 115.26, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8034", "url": "https://www.suse.com/security/cve/CVE-2025-8034" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8034", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8034" }, { "cve": "CVE-2025-8035", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8035" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 128.13, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, Thunderbird \u003c 128.13, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8035", "url": "https://www.suse.com/security/cve/CVE-2025-8035" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8035", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8035" }, { "cve": "CVE-2025-8036", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8036" } ], "notes": [ { "category": "general", "text": "Firefox cached CORS preflight responses across IP address changes. This allowed circumventing CORS with DNS rebinding. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8036", "url": "https://www.suse.com/security/cve/CVE-2025-8036" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8036", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8036" }, { "cve": "CVE-2025-8037", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8037" } ], "notes": [ { "category": "general", "text": "Setting a nameless cookie with an equals sign in the value shadowed other cookies. Even if the nameless cookie was set over HTTP and the shadowed cookie included the `Secure` attribute. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8037", "url": "https://www.suse.com/security/cve/CVE-2025-8037" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8037", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8037" }, { "cve": "CVE-2025-8038", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8038" } ], "notes": [ { "category": "general", "text": "Firefox ignored paths when checking the validity of navigations in a frame. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8038", "url": "https://www.suse.com/security/cve/CVE-2025-8038" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8038", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.4, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8038" }, { "cve": "CVE-2025-8039", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8039" } ], "notes": [ { "category": "general", "text": "In some cases search terms persisted in the URL bar even after navigating away from the search page. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8039", "url": "https://www.suse.com/security/cve/CVE-2025-8039" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8039", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 4.3, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8039" }, { "cve": "CVE-2025-8040", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8040" } ], "notes": [ { "category": "general", "text": "Memory safety bugs present in Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 141, Firefox ESR \u003c 140.1, Thunderbird \u003c 141, and Thunderbird \u003c 140.1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8040", "url": "https://www.suse.com/security/cve/CVE-2025-8040" }, { "category": "external", "summary": "SUSE Bug 1246664 for CVE-2025-8040", "url": "https://bugzilla.suse.com/1246664" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 8.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-branding-upstream-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-common-140.1.0-1.1.x86_64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.aarch64", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.ppc64le", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.s390x", "openSUSE Tumbleweed:firefox-esr-translations-other-140.1.0-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-07-23T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8040" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…