<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaThunderbird-128.9.2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15000-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-04-16T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-04-16T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-04-16T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaThunderbird-128.9.2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaThunderbird-128.9.2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15000</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:15000-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-2830/</URL>
      <Description>SUSE CVE CVE-2025-2830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3522/</URL>
      <Description>SUSE CVE CVE-2025-3522 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-3523/</URL>
      <Description>SUSE CVE CVE-2025-3523 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-128.9.2-1.1">
      <FullProductName ProductID="MozillaThunderbird-128.9.2-1.1">MozillaThunderbird-128.9.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-openpgp-librnp-128.9.2-1.1">
      <FullProductName ProductID="MozillaThunderbird-openpgp-librnp-128.9.2-1.1">MozillaThunderbird-openpgp-librnp-128.9.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-128.9.2-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-128.9.2-1.1">MozillaThunderbird-translations-common-128.9.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-128.9.2-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-128.9.2-1.1">MozillaThunderbird-translations-other-128.9.2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-128.9.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-128.9.2-1.1">MozillaThunderbird-128.9.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-openpgp-librnp-128.9.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.9.2-1.1">MozillaThunderbird-openpgp-librnp-128.9.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-128.9.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.9.2-1.1">MozillaThunderbird-translations-common-128.9.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-128.9.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.9.2-1.1">MozillaThunderbird-translations-other-128.9.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird &lt; 137.0.2 and Thunderbird &lt; 128.9.2.</Note>
    </Notes>
    <CVE>CVE-2025-2830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.9.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-2830.html</URL>
        <Description>CVE-2025-2830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241277</URL>
        <Description>SUSE Bug 1241277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to  determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird &lt; 137.0.2 and Thunderbird &lt; 128.9.2.</Note>
    </Notes>
    <CVE>CVE-2025-3522</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.9.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3522.html</URL>
        <Description>CVE-2025-3522</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241277</URL>
        <Description>SUSE Bug 1241277</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird &lt; 137.0.2 and Thunderbird &lt; 128.9.2.</Note>
    </Notes>
    <CVE>CVE-2025-3523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.9.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.9.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GIKWS5YHK7AB6D4UFHQPWTWDC2B75TA6/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-3523.html</URL>
        <Description>CVE-2025-3523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1241277</URL>
        <Description>SUSE Bug 1241277</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
