openSUSE 16 Security Update : mozjs128 (openSUSE-SU-2025-20135-1)

high Nessus Plugin ID 277554

Synopsis

The remote openSUSE host is missing one or more security updates.

Description

The remote openSUSE 16 host has packages installed that are affected by multiple vulnerabilities as referenced in the openSUSE-SU-2025-20135-1 advisory.

- Update to version 128.14.0 (bsc#1248162):
- CVE-2025-9179: Sandbox escape due to invalid pointer in the Audio/Video: GMP component
- CVE-2025-9180: Same-origin policy bypass in the Graphics:
Canvas2D component
- CVE-2025-9181: Uninitialized memory in the JavaScript Engine component
- CVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142

- Update to version 128.13.0:
- CVE-2025-8027: JavaScript engine only wrote partial return value to stack
- CVE-2025-8028: Large branch table could lead to truncated instruction
- CVE-2025-8029: javascript: URLs executed on object and embed tags
- CVE-2025-8030: Potential user-assisted code execution in Copy as cURL command
- CVE-2025-8031: Incorrect URL stripping in CSP reports
- CVE-2025-8032: XSLT documents could bypass CSP
- CVE-2025-8033: Incorrect JavaScript state machine for generators
- CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
- CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141

- Update to version 128.12.0:
- CVE-2025-6424: Use-after-free in FontFaceSet
- CVE-2025-6425: The WebCompat WebExtension shipped with Firefox exposed a persistent UUID
- CVE-2025-6426: No warning when opening executable terminal files on macOS
- CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of youtube.com
- CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag

- Update to version 128.11.0:
- CVE-2025-5283: Double-free in libvpx encoder
- CVE-2025-5263: Error handling for script execution was incorrectly isolated from web content
- CVE-2025-5264: Potential local code execution in Copy as cURL command
- CVE-2025-5265: Potential local code execution in Copy as cURL command
- CVE-2025-5266: Script element events leaked cross-origin resource status
- CVE-2025-5267: Clickjacking vulnerability could have led to leaking saved payment card details + CVE-2025-5268: Memory safety bugs fixed in Firefox 139, Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11 + CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11 and Thunderbird 128.11

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected libmozjs-128-0, mozjs128 and / or mozjs128-devel packages.

See Also

https://bugzilla.suse.com/1248162

https://www.suse.com/security/cve/CVE-2025-5263

https://www.suse.com/security/cve/CVE-2025-5264

https://www.suse.com/security/cve/CVE-2025-5265

https://www.suse.com/security/cve/CVE-2025-5266

https://www.suse.com/security/cve/CVE-2025-5267

https://www.suse.com/security/cve/CVE-2025-5268

https://www.suse.com/security/cve/CVE-2025-5269

https://www.suse.com/security/cve/CVE-2025-5283

https://www.suse.com/security/cve/CVE-2025-6424

https://www.suse.com/security/cve/CVE-2025-6425

https://www.suse.com/security/cve/CVE-2025-6426

https://www.suse.com/security/cve/CVE-2025-6429

https://www.suse.com/security/cve/CVE-2025-6430

https://www.suse.com/security/cve/CVE-2025-8027

https://www.suse.com/security/cve/CVE-2025-8028

https://www.suse.com/security/cve/CVE-2025-8029

https://www.suse.com/security/cve/CVE-2025-8030

https://www.suse.com/security/cve/CVE-2025-8031

https://www.suse.com/security/cve/CVE-2025-8032

https://www.suse.com/security/cve/CVE-2025-8033

https://www.suse.com/security/cve/CVE-2025-8034

https://www.suse.com/security/cve/CVE-2025-8035

https://www.suse.com/security/cve/CVE-2025-9179

https://www.suse.com/security/cve/CVE-2025-9180

https://www.suse.com/security/cve/CVE-2025-9181

https://www.suse.com/security/cve/CVE-2025-9185

Plugin Details

Severity: High

ID: 277554

File Name: openSUSE-2025-20135-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 12/5/2025

Updated: 12/5/2025

Supported Sensors: Nessus Agent, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.6

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-9185

CVSS v3

Risk Factor: High

Base Score: 8.1

Temporal Score: 7.1

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:novell:opensuse:mozjs128-devel, cpe:/o:novell:opensuse:16.0, p-cpe:/a:novell:opensuse:mozjs128, p-cpe:/a:novell:opensuse:libmozjs-128-0

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 12/3/2025

Vulnerability Publication Date: 5/27/2025

Reference Information

CVE: CVE-2025-5263, CVE-2025-5264, CVE-2025-5265, CVE-2025-5266, CVE-2025-5267, CVE-2025-5268, CVE-2025-5269, CVE-2025-5283, CVE-2025-6424, CVE-2025-6425, CVE-2025-6426, CVE-2025-6429, CVE-2025-6430, CVE-2025-8027, CVE-2025-8028, CVE-2025-8029, CVE-2025-8030, CVE-2025-8031, CVE-2025-8032, CVE-2025-8033, CVE-2025-8034, CVE-2025-8035, CVE-2025-9179, CVE-2025-9180, CVE-2025-9181, CVE-2025-9185