<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaFirefox-139.0.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16258</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-06-03T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-06-03T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-06-03T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaFirefox-139.0.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaFirefox-139.0.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16258</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5263/</URL>
      <Description>SUSE CVE CVE-2025-5263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5264/</URL>
      <Description>SUSE CVE CVE-2025-5264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5265/</URL>
      <Description>SUSE CVE CVE-2025-5265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5266/</URL>
      <Description>SUSE CVE CVE-2025-5266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5267/</URL>
      <Description>SUSE CVE CVE-2025-5267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5268/</URL>
      <Description>SUSE CVE CVE-2025-5268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5270/</URL>
      <Description>SUSE CVE CVE-2025-5270 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5271/</URL>
      <Description>SUSE CVE CVE-2025-5271 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5272/</URL>
      <Description>SUSE CVE CVE-2025-5272 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-139.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-139.0.1-1.1">MozillaFirefox-139.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-139.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-139.0.1-1.1">MozillaFirefox-branding-upstream-139.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-139.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-devel-139.0.1-1.1">MozillaFirefox-devel-139.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-139.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-139.0.1-1.1">MozillaFirefox-translations-common-139.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-139.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-139.0.1-1.1">MozillaFirefox-translations-other-139.0.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-139.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1">MozillaFirefox-139.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-139.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1">MozillaFirefox-branding-upstream-139.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-139.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1">MozillaFirefox-devel-139.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-139.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1">MozillaFirefox-translations-common-139.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-139.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1">MozillaFirefox-translations-other-139.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5263.html</URL>
        <Description>CVE-2025-5263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the newline character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5264.html</URL>
        <Description>CVE-2025-5264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the ampersand character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5265.html</URL>
        <Description>CVE-2025-5265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5266.html</URL>
        <Description>CVE-2025-5266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5267.html</URL>
        <Description>CVE-2025-5267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5268.html</URL>
        <Description>CVE-2025-5268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In certain cases, SNI could have been sent unencrypted even when encrypted DNS was enabled. This vulnerability affects Firefox &lt; 139 and Thunderbird &lt; 139.</Note>
    </Notes>
    <CVE>CVE-2025-5270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5270.html</URL>
        <Description>CVE-2025-5270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Previewing a response in Devtools ignored CSP headers, which could have allowed content injection attacks. This vulnerability affects Firefox &lt; 139 and Thunderbird &lt; 139.</Note>
    </Notes>
    <CVE>CVE-2025-5271</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5271.html</URL>
        <Description>CVE-2025-5271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 138 and Thunderbird 138. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 139 and Thunderbird &lt; 139.</Note>
    </Notes>
    <CVE>CVE-2025-5272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-139.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-139.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5272.html</URL>
        <Description>CVE-2025-5272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
