FERRAMENTAS LINUX: Critical Firefox Security Update for openSUSE Leap 15.6 – Patch Now!

quinta-feira, 5 de junho de 2025

Critical Firefox Security Update for openSUSE Leap 15.6 – Patch Now!

 

SUSE


Critical Mozilla Firefox security update for openSUSE Leap 15.6 fixes 9 vulnerabilities, including CVE-2025-5267 (payment card leak) and CVE-2025-5268 (code execution). Learn patch commands for SUSE Linux Enterprise, SAP, and HPC systems.

Urgent: Mozilla Firefox ESR 128.11 Fixes High-Risk Vulnerabilities

Linux administrators and openSUSE users: A critical security update for Mozilla Firefox ESR (v128.11) has been released, addressing multiple high-severity vulnerabilities that could lead to remote code execution, data leaks, and clickjacking attacks

This patch is classified as "important" (2025:01814-1) and should be applied immediately to protect your systems.

Key Security Fixes in This Update

The latest Firefox ESR release resolves the following zero-day exploits and CVEs:

  • CVE-2025-5263: Improper script execution isolation (risk: cross-origin data leakage)

  • CVE-2025-5264 & CVE-2025-5265: Local code execution via "Copy as cURL" command (critical for developers/sysadmins)

  • CVE-2025-5266: Script element events leaking sensitive resource status

  • CVE-2025-5267Clickjacking flaw exposing saved payment card details

  • CVE-2025-5268/5269: Memory corruption bugs (arbitrary code execution risk)

🔴 Why This Matters: Unpatched systems are vulnerable to drive-by downloads, credential theft, and privilege escalation. Enterprise users (especially SAP, HPC, and SLES environments) should prioritize this update.


How to Install the Firefox Security Patch

Recommended Methods

  1. YaST Online Update (GUI)

  2. Terminal Command:

    bash
    Copy
    Download
    zypper in -t patch openSUSE-SLE-15.6-2025-1814=1  

Enterprise-Specific Patch Commands

ProductCommand
SUSE Linux Enterprise Server 15 SP5zypper in -t patch SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1814=1
SUSE Linux Enterprise High Performance Computingzypper in -t patch SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1814=1
SUSE Linux Enterprise Server for SAPzypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1814=1

📌 Pro Tip: Verify installation with zypper patches --cve to confirm all CVEs are resolved.


Affected Packages & Architectures

This update covers:

  • MozillaFirefox 128.11 (x86_64, aarch64, ppc64le, s390x)

  • Debugging packages (MozillaFirefox-debuginfo-debugsource)

  • Localization modules (MozillaFirefox-translations-common)

Full package listSee SUSE Security Advisory SUSE-SU-2025:01814-1.


Why Prompt Patching is Non-Negotiable

  • Financial Risk: CVE-2025-5267 could expose saved credit card data in browsers.

  • Compliance: GDPR/PCI-DSS require timely vulnerability remediation.

  • Enterprise Threats: Memory corruption bugs (CVE-2025-5268/69) are actively exploited in the wild.


FAQ: Firefox Security Update

Q1. Is this update relevant for desktop users?

✅ Yes. All openSUSE Leap 15.6 users must apply it.

Q2. Can I delay patching in a production environment?

❌ No. The CVEs have public exploits (see MITRE ATT&CK).

Q3. Does this affect Thunderbird?

⚠️ Partially. Some memory safety fixes (CVE-2025-5268) apply to Thunderbird 128.11.

Nenhum comentário:

Postar um comentário