123 Star 0 Fork 54

src-openEuler/firefox

CVE-2025-1017

已挂起
CVE和安全问题
Opened this issue  
2025-02-05 01:42

一、漏洞信息
漏洞编号:CVE-2025-1017
漏洞归属组件:firefox
漏洞归属的版本:100.0.2,102.14.0,102.15.0,102.8.0,115.15.0,128.5.0,128.6.0,128.7.0,62.0.3,79.0
CVSS V3.0分值:
BaseScore:9.8 Critical
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
漏洞简述:
Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135.
漏洞公开时间:2025-02-04 22:15:32
漏洞创建时间:2025-02-05 01:42:26
漏洞详情参考链接:
https://nvd.nist.gov/vuln/detail/CVE-2025-1017

更多参考(点击展开)
参考来源 参考链接 来源链接
security.mozilla.org https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2025-07/
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2025-09/
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2025-10/
security.mozilla.org https://www.mozilla.org/security/advisories/mfsa2025-11/
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1066 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1133 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1135 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1138 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1136 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1132 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1132 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1137 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1139 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1140 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1184 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1283 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1292 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1319 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1317 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1318 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1339 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1340 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1341 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
redhat_bugzilla https://access.redhat.com/errata/RHSA-2025:1348 https://bugzilla.redhat.com/show_bug.cgi?id=2343748
firefox https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471 https://www.mozilla.org/en-US/security/advisories/mfsa2025-11/
anolis https://anas.openanolis.cn/cves/detail/CVE-2025-1017
mageia http://advisories.mageia.org/MGASA-2025-0048.html
amazon_linux_explore https://access.redhat.com/security/cve/CVE-2025-1017 https://explore.alas.aws.amazon.com/CVE-2025-1017.html
amazon_linux_explore https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-1017 https://explore.alas.aws.amazon.com/CVE-2025-1017.html

漏洞分析指导链接:
https://gitee.com/openeuler/cve-manager/blob/master/cve-vulner-manager/doc/md/manual.md
漏洞数据来源:
其它
漏洞补丁信息:

详情(点击展开)
影响的包 修复版本 修复补丁 问题引入补丁 来源
https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471 nvd
https://www.mozilla.org/security/advisories/mfsa2025-07/ nvd
https://www.mozilla.org/security/advisories/mfsa2025-09/ nvd
https://www.mozilla.org/security/advisories/mfsa2025-10/ nvd
https://www.mozilla.org/security/advisories/mfsa2025-11/ nvd

二、漏洞分析结构反馈
影响性分析说明:
该漏洞需升级至128.7.0版本修复,24.03和master分支采用升级方式处理,22.03、20.03目前依赖不满足(rust >=1.76 llvm>=16),暂时无法升级
openEuler评分:
9.8
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
受影响版本排查(受影响/不受影响):
1.master(128.9.0):受影响
2.openEuler-20.03-LTS-SP4(79.0):受影响
3.openEuler-22.03-LTS-SP3(128.9.0):受影响
4.openEuler-24.03-LTS(128.9.0):受影响
5.openEuler-24.03-LTS-Next(128.9.0):受影响
6.openEuler-22.03-LTS-SP4(128.9.0):受影响
7.openEuler-24.03-LTS-SP1(128.9.0):受影响
8.openEuler-24.03-LTS-SP2(128.9.0):

修复是否涉及abi变化(是/否):
1.master(128.9.0):否
2.openEuler-20.03-LTS-SP4(79.0):否
3.openEuler-22.03-LTS-SP3(128.9.0):否
4.openEuler-24.03-LTS(128.9.0):否
5.openEuler-24.03-LTS-Next(128.9.0):否
6.openEuler-22.03-LTS-SP4(128.9.0):否
7.openEuler-24.03-LTS-SP1(128.9.0):否
8.openEuler-24.03-LTS-SP2(128.9.0):

原因说明:
1.master(128.9.0):正常修复
2.openEuler-24.03-LTS(128.9.0):正常修复
3.openEuler-24.03-LTS-Next(128.9.0):正常修复
4.openEuler-24.03-LTS-SP1(128.9.0):正常修复
5.openEuler-20.03-LTS-SP4(79.0):暂不修复-待升级版本修复
6.openEuler-22.03-LTS-SP3(128.9.0):暂不修复-待升级版本修复
7.openEuler-22.03-LTS-SP4(128.9.0):暂不修复-待升级版本修复
8.openEuler-24.03-LTS-SP2(128.9.0):

Comments (14)

majun-bot createdCVE和安全问题 4 months ago
majun-bot added
 
CVE/UNFIXED
label
4 months ago
Expand operation logs
openeuler-ci-bot added
 
sig/Application
label
4 months ago
参考网址 关联pr 状态 补丁链接
https://nvd.nist.gov/vuln/detail/CVE-2025-1017
https://ubuntu.com/security/CVE-2025-1017
https://www.opencve.io/cve/CVE-2025-1017
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2025-1017
https://security-tracker.debian.org/tracker/CVE-2025-1017

说明:抱歉,当前工具暂未找到推荐补丁,请人工查找或者之后评论'/find-patch'尝试再次查找。
若人工查找到补丁,烦请在此issue下评论 '/report-patch 参考网址 补丁链接1,补丁链接2' 便于我们不断优化工具,不胜感激。
如 /report-patch https://security-tracker.debian.org/tracker/CVE-2021-3997 https://github.com/systemd/systemd/commit/5b1cf7a9be37e20133c0208005274ce4a5b5c6a1

openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot set start time to 2025-02-05 4 months ago
openeuler-ci-bot set deadline to 2025-03-07 4 months ago
openeuler-ci-bot set priority to Secondary 4 months ago
wk333 related pull requestsrc-openEuler/firefox Pull Request !256 4 months ago
wk333-wk333 wk333 member 4 months ago

影响性分析说明:
该漏洞需升级至128.7.0版本修复,24.03和master分支采用升级方式处理,22.03、20.03目前依赖不满足(rust >=1.76 llvm>=16),暂时无法升级

受影响版本排查(受影响/不受影响):
1.master:受影响
2.openEuler-20.03-LTS-SP4:受影响
3.openEuler-22.03-LTS-SP3:受影响
4.openEuler-24.03-LTS:受影响
5.openEuler-24.03-LTS-Next:受影响
6.openEuler-22.03-LTS-SP4:受影响
7.openEuler-24.03-LTS-SP1:受影响

修复是否涉及abi变化(是/否):
1.master:否
2.openEuler-20.03-LTS-SP4:否
3.openEuler-22.03-LTS-SP3:否
4.openEuler-24.03-LTS:否
5.openEuler-24.03-LTS-Next:否
6.openEuler-22.03-LTS-SP4:否
7.openEuler-24.03-LTS-SP1:否

原因说明:
1.master:正常修复
2.openEuler-20.03-LTS-SP4:暂不修复-待升级版本修复
3.openEuler-22.03-LTS-SP3:暂不修复-待升级版本修复
4.openEuler-24.03-LTS:正常修复
5.openEuler-24.03-LTS-Next:正常修复
6.openEuler-22.03-LTS-SP4:暂不修复-待升级版本修复
7.openEuler-24.03-LTS-SP1:正常修复

openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot through merging Pull Request !257: [sync] PR-256: Update to 128.7.0 changed issue state from 待办的 to 已完成 4 months ago
openeuler-ci-bot changed issue state from 已完成 to 待办的 4 months ago
openeuler-ci-bot changed description 4 months ago
wk333-wk333 wk333 member 4 months ago

openEuler评分:
BaseScore:9.8 Critical
Vector:CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed start time from 2025-02-05 to 2025-02-07 4 months ago
openeuler-ci-bot changed deadline from 2025-03-07 to 2025-02-14 4 months ago
openeuler-ci-bot changed priority from Secondary to Serious 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed description 4 months ago
wk333 related pull requestsrc-openEuler/firefox Pull Request !261 4 months ago
wk333 related pull requestsrc-openEuler/firefox Pull Request !262 4 months ago
wk333-wk333 wk333 member 4 months ago

openEuler评分:
BaseScore: 9.8 Critical
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

openeuler-ci-bot changed description 4 months ago
openeuler-ci-bot changed issue state from 待办的 to 已挂起 4 months ago
openeuler-ci-bot changed description 2 months ago

Sign in to comment

Status
Assignees
Projects
Duration (hours)
Planed to start   -   Planed to end
-
Top level
Priority
Milestones
Branches
参与者(3)
5329419 openeuler ci bot 1632792936 wk333-wk333 majun-bot-openMajun_admin
1
https://gitee.com/src-openeuler/firefox.git
git@gitee.com:src-openeuler/firefox.git
src-openeuler
firefox
firefox

Search