Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. %if 0 %global mozdebugprefix /lib/debug %global mozdebugdir /lib/debug/ %global unamem %(uname -m) %global symbolsfilename -.en-US.-%(uname.crashreporter-symbols.zip %global symbolsfilepath /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip %global _finddebuginfoopts -p /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip -o debugcrashreporter.list %global crashreporterpkg_name mozilla-crashreporter--debuginfo
Security Fix(es):
An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9179)
'Same-origin policy bypass in the Graphics: Canvas2D component.' This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9180)
Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 142, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9181)
{ "severity": "Critical" }
{ "src": [ "firefox-128.14.0-1.oe2203sp3.src.rpm" ], "aarch64": [ "firefox-128.14.0-1.oe2203sp3.aarch64.rpm", "firefox-debuginfo-128.14.0-1.oe2203sp3.aarch64.rpm", "firefox-debugsource-128.14.0-1.oe2203sp3.aarch64.rpm" ], "x86_64": [ "firefox-128.14.0-1.oe2203sp3.x86_64.rpm", "firefox-debuginfo-128.14.0-1.oe2203sp3.x86_64.rpm", "firefox-debugsource-128.14.0-1.oe2203sp3.x86_64.rpm" ] }