SUSE-SU-2025:02339-1: important: Security update for MozillaFirefox, MozillaFirefox-branding-SLE
SLE-UPDATES
null at suse.de
Thu Jul 17 12:30:39 UTC 2025
# Security update for MozillaFirefox, MozillaFirefox-branding-SLE
Announcement ID: SUSE-SU-2025:02339-1
Release Date: 2025-07-17T08:52:32Z
Rating: important
References:
* bsc#1244670
Cross-References:
* CVE-2025-6424
* CVE-2025-6425
* CVE-2025-6426
* CVE-2025-6427
* CVE-2025-6428
* CVE-2025-6429
* CVE-2025-6430
* CVE-2025-6431
* CVE-2025-6432
* CVE-2025-6433
* CVE-2025-6434
* CVE-2025-6435
* CVE-2025-6436
CVSS scores:
* CVE-2025-6424 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6424 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6424 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-6425 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6425 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6425 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-6426 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:L
* CVE-2025-6426 ( SUSE ): 8.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L
* CVE-2025-6426 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6427 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6427 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6427 ( NVD ): 9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
* CVE-2025-6428 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N
* CVE-2025-6428 ( SUSE ): 8.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:N
* CVE-2025-6428 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6429 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6429 ( SUSE ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6429 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2025-6430 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
* CVE-2025-6430 ( SUSE ): 6.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2025-6430 ( NVD ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2025-6431 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:L
* CVE-2025-6431 ( SUSE ): 5.8 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L
* CVE-2025-6431 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2025-6432 ( SUSE ): 2.3
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6432 ( SUSE ): 4.2 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6432 ( NVD ): 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L
* CVE-2025-6433 ( SUSE ): 5.3
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6433 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6433 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-6434 ( SUSE ): 5.1
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
* CVE-2025-6434 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-6434 ( NVD ): 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N
* CVE-2025-6435 ( SUSE ): 7.5
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6435 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6435 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-6436 ( SUSE ): 8.7
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
* CVE-2025-6436 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-6436 ( NVD ): 8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
Affected Products:
* SUSE Linux Enterprise High Performance Computing 12 SP5
* SUSE Linux Enterprise Server 12 SP5
* SUSE Linux Enterprise Server 12 SP5 LTSS
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
* SUSE Linux Enterprise Server for SAP Applications 12 SP5
An update that solves 13 vulnerabilities can now be installed.
## Description:
This update for MozillaFirefox, MozillaFirefox-branding-SLE fixes the following
issues:
This is the Firefox Extended Support Release 140.0esr ESR
Major changes:
General:
* Reader View now has an enhanced Text and Layout menu with new options for
character spacing, word spacing, and text alignment. These changes offer a
more accessible reading experience.
* Reader View now has a Theme menu with additional Contrast and Gray options.
You can also select custom colors for text, background, and links from the
Custom tab.
* Firefox will now offer to temporarily remember when users grant permissions
to sites (e.g. geolocation). Temporary permissions will be removed either
after one hour or when the tab is closed.
* Firefox now includes safeguards to prevent sites from abusing the history
API by generating excessive history entries, which can make navigating with
the back and forward buttons difficult by cluttering the history. This
intervention ensures that such entries, unless interacted with by the user,
are skipped when using the back and forward buttons.
* Firefox now identifies all links in PDFs and turns them into hyperlinks.
* You can now copy links from background tabs using the tabstrip context menu
on macOS and Linux.
* Users on macOS and Linux are now given the option to close only the current
tab if the Quit keyboard shortcut is used while multiple tabs are open in
the window. (bmo#None)
Sidebar and Tabs:
* You can now enable the updated Firefox sidebar in Settings > General >
Browser Layout to quickly access multiple tools in one click, without
leaving your main view. Sidebar tools include an AI chatbot of your choice,
bookmarks, history, and tabs from devices you sync with your Mozilla
account.
* Keep a lot of tabs open? Try our new vertical tabs layout to quickly scan
your list of tabs. With vertical tabs, your open and pinned tabs appear in
the sidebar instead of along the top of the browser. To turn on vertical
tabs, right-click on the toolbar near the top of the browser and select Turn
on Vertical Tabs. If you’ve enabled the updated sidebar, you can also go to
Customize sidebar and check Vertical tabs. Early testers report feeling more
organized after using vertical tabs for a few days.
* Stay productive and organized with less effort by grouping related tabs
together. One simple way to create a group is to drag a tab onto another,
pause until you see a highlight, then drop to create the group. Tab groups
can be named, color-coded, and are always saved. You can close a group and
reopen it later.
* A tab preview is now displayed when hovering the mouse over background tabs,
making it easier to locate the desired tab without needing to switch tabs.
* The sidebar to view tabs from other devices can now be opened via the Tab
overview menu.
Security & Privacy:
* HTTPS is replacing HTTP as the default protocol in the address bar on non-
local sites. If a site is not available via HTTPS, Firefox will fall back to
HTTP.
* Firefox now blocks third-party cookie access when Enhanced Tracking
Protection's Strict mode is enabled.
* Firefox now has a new anti-tracking feature, Bounce Tracking Protection,
which is now available in Enhanced Tracking Protection's "Strict" mode. This
feature detects bounce trackers based on their redirect behavior and
periodically purges their cookies and site data to block tracking.
* Firefox now enforces certificate transparency, requiring web servers to
provide sufficient proof that their certificates were publicly disclosed
before they will be trusted. This only affects servers using certificates
issued by a certificate authority in Mozilla's Root CA Program.
* Smartblock Embeds allows users to selectively unblock certain social media
embeds that are blocked in ETP Strict and Private Browsing modes. Currently,
support is limited to a few embed types, with more to be added in future
updates.
* Firefox now upgrades page loads to HTTPS by default and gracefully falls
back to HTTP if the secure connection fails. This behavior is known as
HTTPS-First.
* The "Copy Without Site Tracking" menu item was renamed to "Copy Clean Link"
to help clarify expectations around what the feature does. "Copy Clean Link"
is a list based approach to remove - known tracking parameters from links.
This option can also now be used on plain text links.
* The Clear browsing data and cookies dialog now allows clearing saved form
info separately from browsing history.
Translations:
* Firefox now allows translating selected text portions to different languages
after a full-page translation.
* Full-Page Translations are now available within Firefox extension pages that
start with the moz-extension:// URL scheme.
* When suggesting a default translation language, Firefox will now take into
consideration languages you have previously used for translations.
* Added support for many new languages in Firefox translation.
Windows:
* Canvas2D switched from Direct2D to a platform independent acceleration
backend on Windows.
* Hardware-accelerated playback of HEVC video content is now supported on
Windows.
* Firefox on Windows 11 now uses acrylic-style menus for popup windows, which
better match the operating system’s aesthetic. (bmo#None)
Linux:
* Firefox now supports touchpad hold gestures on Linux. This means that
kinetic (momentum) scrolling can now be interrupted by placing two fingers
on the touchpad. (bmo#None)
* Developer:
* Firefox now supports text fragments, which allows users to link directly to
a specific portion of text in a web document via a special URL fragment.
* Debugger log-point values are now automatically converted into profiler
markers, making it easy to add information to the marker timeline directly
from the Debugger.
* The Debugger's directory root is now scoped to the specific domain where it
was set, which aligns with typical usage and avoids applying it across
unrelated domains. This builds on previous improvements such as a redesigned
UI and easier removal of the root setting. Setting a directory root updates
the Source List to show only the selected directory and its children. (Learn
more)
* The Network Blocking feature in the Network panel now blocks HTTP requests
in addition to blocking responses.
* The Network panel displays information about Early Hints, including a dedicated indicator for the 103 HTTP status code in the user interface.
* The Network panel now allows overriding network request responses with local
files.
* The filter setting in the Network panel is now preserved across DevTools
Toolbox sessions.
* A new column has been added to the Network panel to display the full path of
the request URL. This enhancement makes helps developers quickly view and
analyze complete request paths.
* Introduced a new console command `$$$` that allows searching the page,
including within shadow roots.
* Improved support for debugging web extensions, such as automatically
reloading the web extension's source code in the Debugger when the extension
is reloaded. Workers are now available in the Console panel’s context
selector and breakpoints function correctly in content scripts.
* In the Inspector Fonts panel, we now display fonts metadata, like the font
version, designer, vendor, license, etc.
* Added support for the import map integrity field, allowing you to ensure the
integrity of dynamically or statically imported modules.
* Implemented support for `Error.isError`, enabling brand checks to determine
whether an object is an instance of Error. (Learn more)
* Added support for the `error.captureStackTrace` extension to improve
compatibility with other browsers. (Learn more) [5]:
http://github.com/tc39/proposal-error- capturestacktrace (bmo#None)
* Enterprise:
* The UserMessaging policy has been updated with a new option to allow
disabling Firefox Labs in preferences.
* The Preferences policy has been updated to allow setting the preference
security.pki.certificate_transparency.mode.
* HTTPS-First is now on by default. You can manage this behavior using the
HttpsOnlyMode and HttpAllowlist policies.
* An internal change has been made to Firefox that removes
`XPCOMUtils.defineLazyGetter`. For most people, this shouldn't matter, but
if you encounter problems with AutoConfig or third party software like
PolicyPak, this might be the cause. You'll need to reach out to your
provider.
* Firefox now supports the Content Analysis SDK for integrating DLP software.
For more information, see this post.
* The SearchEngines policy is now available on all versions of Firefox (not
just the ESR).
* Fixed: Various security fixes.
MFSA 2025-51 (bsc#1244670) * CVE-2025-6424 (bmo#1966423) Use-after-free in
FontFaceSet * CVE-2025-6425 (bmo#1717672) The WebCompat WebExtension shipped
with Firefox exposed a persistent UUID * CVE-2025-6426 (bmo#1964385) No warning
when opening executable terminal files on macOS * CVE-2025-6427 (bmo#1966927)
connect-src Content Security Policy restriction could be bypassed *
CVE-2025-6428 (bmo#1970151) Firefox for Android opened URLs specified in a link
querystring parameter * CVE-2025-6429 (bmo#1970658) Incorrect parsing of URLs
could have allowed embedding of youtube.com * CVE-2025-6430 (bmo#1971140)
Content-Disposition header ignored when a file is included in an embed or object
tag * CVE-2025-6431 (bmo#1942716) The prompt in Firefox for Android that asks
before opening a link in an external application could be bypassed *
CVE-2025-6432 (bmo#1943804) DNS Requests leaked outside of a configured SOCKS
proxy * CVE-2025-6433 (bmo#1954033) WebAuthn would allow a user to sign a
challenge on a webpage with an invalid TLS certificate * CVE-2025-6434
(bmo#1955182) HTTPS-Only exception screen lacked anti-clickjacking delay *
CVE-2025-6435 (bmo#1950056, bmo#1961777) Save as in Devtools could download
files without sanitizing the extension * CVE-2025-6436 (bmo#1941377,
bmo#1960948, bmo#1966187, bmo#1966505, bmo#1970764) Memory safety bugs fixed in
Firefox 140 and Thunderbird 140
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
* SUSE Linux Enterprise Server 12 SP5 LTSS
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-2025-2339=1
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security
zypper in -t patch SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2339=1
## Package List:
* SUSE Linux Enterprise Server 12 SP5 LTSS (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-140.0-112.270.2
* MozillaFirefox-branding-SLE-140-35.19.5
* MozillaFirefox-translations-common-140.0-112.270.2
* MozillaFirefox-debuginfo-140.0-112.270.2
* MozillaFirefox-debugsource-140.0-112.270.2
* SUSE Linux Enterprise Server 12 SP5 LTSS (noarch)
* MozillaFirefox-devel-140.0-112.270.2
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (x86_64)
* MozillaFirefox-140.0-112.270.2
* MozillaFirefox-branding-SLE-140-35.19.5
* MozillaFirefox-translations-common-140.0-112.270.2
* MozillaFirefox-debuginfo-140.0-112.270.2
* MozillaFirefox-debugsource-140.0-112.270.2
* SUSE Linux Enterprise Server 12 SP5 LTSS Extended Security (noarch)
* MozillaFirefox-devel-140.0-112.270.2
## References:
* https://www.suse.com/security/cve/CVE-2025-6424.html
* https://www.suse.com/security/cve/CVE-2025-6425.html
* https://www.suse.com/security/cve/CVE-2025-6426.html
* https://www.suse.com/security/cve/CVE-2025-6427.html
* https://www.suse.com/security/cve/CVE-2025-6428.html
* https://www.suse.com/security/cve/CVE-2025-6429.html
* https://www.suse.com/security/cve/CVE-2025-6430.html
* https://www.suse.com/security/cve/CVE-2025-6431.html
* https://www.suse.com/security/cve/CVE-2025-6432.html
* https://www.suse.com/security/cve/CVE-2025-6433.html
* https://www.suse.com/security/cve/CVE-2025-6434.html
* https://www.suse.com/security/cve/CVE-2025-6435.html
* https://www.suse.com/security/cve/CVE-2025-6436.html
* https://bugzilla.suse.com/show_bug.cgi?id=1244670
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250717/5b2c1dca/attachment.htm>
More information about the sle-updates
mailing list