SUSE SLES12 Security Update : MozillaFirefox (SUSE-SU-2025:02531-1)

critical Nessus Plugin ID 242953

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02531-1 advisory.

- Firefox Extended Support Release 140.1.0 ESR
* MFSA-RESERVE-2025-1968423 (bmo#1968423) JavaScript engine only wrote partial return value to stack
* MFSA-RESERVE-2025-1971581 (bmo#1971581) Large branch table could lead to truncated instruction
* MFSA-RESERVE-2025-1928021 (bmo#1928021) CSP does not block javascript: URLs on object and embed tags
* MFSA-RESERVE-2025-1960834 (bmo#1960834) DNS rebinding circumvents CORS
* MFSA-RESERVE-2025-1964767 (bmo#1964767) Nameless cookies shadow secure cookies
* MFSA-RESERVE-2025-1968414 (bmo#1968414) Potential user-assisted code execution in Copy as cURL command
* MFSA-RESERVE-2025-1971719 (bmo#1971719) Incorrect URL stripping in CSP reports
* MFSA-RESERVE-2025-1974407 (bmo#1974407) XSLT documents could by-pass CSP
* MFSA-RESERVE-2025-1808979 (bmo#1808979) CSP frame-src was not correctly enforced for paths
* MFSA-RESERVE-2025-1970997 (bmo#1970997) Search terms persist in URL bar
* MFSA-RESERVE-2025-1973990 (bmo#1973990) Incorrect JavaScript state machine for generators
* MFSA-RESERVE-2025-1 (bmo#1970422, bmo#1970422, bmo#1970422, bmo#1970422) Memory safety bugs fixed in Firefox ESR 115.26, Thunderbird ESR 115.26, Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
* MFSA-RESERVE-2025-2 (bmo#1975058, bmo#1975058, bmo#1975998, bmo#1975998) Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
* MFSA-RESERVE-2025-3 (bmo#1975961, bmo#1975961, bmo#1975961) Memory safety bugs fixed in Firefox ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141

Various security fixes MFSA 2025-59 (bsc#1246664):
- CVE-2025-8027: JavaScript engine only wrote partial return value to stack
- CVE-2025-8028: Large branch table could lead to truncated instruction
- CVE-2025-8029: javascript: URLs executed on object and embed tags
- CVE-2025-8036: DNS rebinding circumvents CORS
- CVE-2025-8037: Nameless cookies shadow secure cookies
- CVE-2025-8030: Potential user-assisted code execution in Copy as cURL command
- CVE-2025-8031: Incorrect URL stripping in CSP reports
- CVE-2025-8032: XSLT documents could bypass CSP
- CVE-2025-8038: CSP frame-src was not correctly enforced for paths
- CVE-2025-8039: Search terms persisted in URL bar
- CVE-2025-8033: Incorrect JavaScript state machine for generators
- CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- CVE-2025-8040: Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected MozillaFirefox, MozillaFirefox-devel and / or MozillaFirefox-translations-common packages.

See Also

https://bugzilla.suse.com/1246664

https://www.suse.com/security/cve/CVE-2025-8027

https://www.suse.com/security/cve/CVE-2025-8028

https://www.suse.com/security/cve/CVE-2025-8029

https://www.suse.com/security/cve/CVE-2025-8030

https://www.suse.com/security/cve/CVE-2025-8031

https://www.suse.com/security/cve/CVE-2025-8032

https://www.suse.com/security/cve/CVE-2025-8033

https://www.suse.com/security/cve/CVE-2025-8034

https://www.suse.com/security/cve/CVE-2025-8035

https://www.suse.com/security/cve/CVE-2025-8036

https://www.suse.com/security/cve/CVE-2025-8037

https://www.suse.com/security/cve/CVE-2025-8038

https://www.suse.com/security/cve/CVE-2025-8039

https://www.suse.com/security/cve/CVE-2025-8040

https://lists.suse.com/pipermail/sle-updates/2025-July/040939.html

Plugin Details

Severity: Critical

ID: 242953

File Name: suse_SU-2025-02531-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/29/2025

Updated: 7/29/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-8040

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-8038

Vulnerability Information

CPE: p-cpe:/a:novell:suse_linux:mozillafirefox, cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:mozillafirefox-devel, p-cpe:/a:novell:suse_linux:mozillafirefox-translations-common

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/28/2025

Vulnerability Publication Date: 7/22/2025

Reference Information

CVE: CVE-2025-8027, CVE-2025-8028, CVE-2025-8029, CVE-2025-8030, CVE-2025-8031, CVE-2025-8032, CVE-2025-8033, CVE-2025-8034, CVE-2025-8035, CVE-2025-8036, CVE-2025-8037, CVE-2025-8038, CVE-2025-8039, CVE-2025-8040

SuSE: SUSE-SU-2025:02531-1