<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libmozjs-128-0-128.12.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16377</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-06T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-06T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-06T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libmozjs-128-0-128.12.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libmozjs-128-0-128.12.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16377</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5263/</URL>
      <Description>SUSE CVE CVE-2025-5263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5264/</URL>
      <Description>SUSE CVE CVE-2025-5264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5265/</URL>
      <Description>SUSE CVE CVE-2025-5265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5266/</URL>
      <Description>SUSE CVE CVE-2025-5266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5267/</URL>
      <Description>SUSE CVE CVE-2025-5267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5268/</URL>
      <Description>SUSE CVE CVE-2025-5268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5269/</URL>
      <Description>SUSE CVE CVE-2025-5269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5283/</URL>
      <Description>SUSE CVE CVE-2025-5283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6424/</URL>
      <Description>SUSE CVE CVE-2025-6424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6425/</URL>
      <Description>SUSE CVE CVE-2025-6425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6426/</URL>
      <Description>SUSE CVE CVE-2025-6426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6429/</URL>
      <Description>SUSE CVE CVE-2025-6429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6430/</URL>
      <Description>SUSE CVE CVE-2025-6430 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmozjs-128-0-128.12.0-1.1">
      <FullProductName ProductID="libmozjs-128-0-128.12.0-1.1">libmozjs-128-0-128.12.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs128-128.12.0-1.1">
      <FullProductName ProductID="mozjs128-128.12.0-1.1">mozjs128-128.12.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs128-devel-128.12.0-1.1">
      <FullProductName ProductID="mozjs128-devel-128.12.0-1.1">mozjs128-devel-128.12.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmozjs-128-0-128.12.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1">libmozjs-128-0-128.12.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-128.12.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozjs128-128.12.0-1.1">mozjs128-128.12.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-devel-128.12.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1">mozjs128-devel-128.12.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5263.html</URL>
        <Description>CVE-2025-5263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the newline character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5264.html</URL>
        <Description>CVE-2025-5264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the ampersand character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5265.html</URL>
        <Description>CVE-2025-5265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5266.html</URL>
        <Description>CVE-2025-5266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5267.html</URL>
        <Description>CVE-2025-5267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5268.html</URL>
        <Description>CVE-2025-5268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 128.11 and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5269.html</URL>
        <Description>CVE-2025-5269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2025-5283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5283.html</URL>
        <Description>CVE-2025-5283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243741</URL>
        <Description>SUSE Bug 1243741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 115.25, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6424.html</URL>
        <Description>CVE-2025-6424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 115.25, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6425.html</URL>
        <Description>CVE-2025-6425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The executable file warning did not warn users before opening files with the `terminal` extension. 
*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6426.html</URL>
        <Description>CVE-2025-6426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an `embed` tag.  This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6429.html</URL>
        <Description>CVE-2025-6429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&amp;lt;embed&amp;gt;` or `&amp;lt;object&amp;gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libmozjs-128-0-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-128.12.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozjs128-devel-128.12.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6430.html</URL>
        <Description>CVE-2025-6430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
