<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaThunderbird-128.11.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15174-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-05-30T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-05-30T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-05-30T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaThunderbird-128.11.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaThunderbird-128.11.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15174</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:15174-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5262/</URL>
      <Description>SUSE CVE CVE-2025-5262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5263/</URL>
      <Description>SUSE CVE CVE-2025-5263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5264/</URL>
      <Description>SUSE CVE CVE-2025-5264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5265/</URL>
      <Description>SUSE CVE CVE-2025-5265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5266/</URL>
      <Description>SUSE CVE CVE-2025-5266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5267/</URL>
      <Description>SUSE CVE CVE-2025-5267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5268/</URL>
      <Description>SUSE CVE CVE-2025-5268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5269/</URL>
      <Description>SUSE CVE CVE-2025-5269 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-128.11.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-128.11.0-1.1">MozillaThunderbird-128.11.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-openpgp-librnp-128.11.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-openpgp-librnp-128.11.0-1.1">MozillaThunderbird-openpgp-librnp-128.11.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-128.11.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-128.11.0-1.1">MozillaThunderbird-translations-common-128.11.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-128.11.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-128.11.0-1.1">MozillaThunderbird-translations-other-128.11.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-128.11.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1">MozillaThunderbird-128.11.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-openpgp-librnp-128.11.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1">MozillaThunderbird-openpgp-librnp-128.11.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-128.11.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1">MozillaThunderbird-translations-common-128.11.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-128.11.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1">MozillaThunderbird-translations-other-128.11.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A double-free could have occurred in `vpx_codec_enc_init_multi` after a failed allocation when initializing the encoder for WebRTC. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 139 and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5262.html</URL>
        <Description>CVE-2025-5262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5263.html</URL>
        <Description>CVE-2025-5263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the newline character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5264.html</URL>
        <Description>CVE-2025-5264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the ampersand character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5265.html</URL>
        <Description>CVE-2025-5265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5266.html</URL>
        <Description>CVE-2025-5266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5267.html</URL>
        <Description>CVE-2025-5267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5268.html</URL>
        <Description>CVE-2025-5268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 128.11 and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-128.11.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-128.11.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/TEMWQQR3WLN7ACI6LZQ7KQO5GLIQ3HLM/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5269.html</URL>
        <Description>CVE-2025-5269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
