SB2025103192 - openEuler 22.03 LTS SP4 update for firefox



SB2025103192 - openEuler 22.03 LTS SP4 update for firefox

Published: October 31, 2025

Security Bulletin ID SB2025103192
Severity
High
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

High 50% Medium 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2023-28161)

The vulnerability allows a remote attacker to gain access to otherwise restricted functionality.

The vulnerability exists due to way one-time permissions are handled with the browser tab. If temporary "one-time" permissions, such as the ability to use the Camera, were granted to a document loaded using a file: URL, that permission persisted in that tab for all other documents loaded from a file: URL.


2) Use-after-free (CVE-ID: CVE-2023-29543)

The vulnerability allows a remote attacker to compromise vulnerable system.

The vulnerability exists due to a use-after-free error in debugging APIs. A remote attacker can trick the victim to visit a specially crafted website, trigger a use-after-free error and execute arbitrary code on the system.

Successful exploitation of the vulnerability may allow an attacker to compromise vulnerable system.


3) Buffer overflow (CVE-ID: CVE-2023-29551)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The vulnerability exists due to a boundary error when processing HTML content. A remote attacker can create a specially crafted website, trick the victim into opening it, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.


4) Security features bypass (CVE-ID: CVE-2025-9185)

The vulnerability allows a remote attacker to bypass implemented security restrictions.

The vulnerability exists due to an error in the Graphics: Canvas2D component. A remote attacker can bypass Same-origin policy restrictions.


Remediation

Install update from vendor's website.