<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaThunderbird-140.4.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16708</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-10-18T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-10-18T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-10-18T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaThunderbird-140.4.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaThunderbird-140.4.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16708</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11708/</URL>
      <Description>SUSE CVE CVE-2025-11708 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11709/</URL>
      <Description>SUSE CVE CVE-2025-11709 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11710/</URL>
      <Description>SUSE CVE CVE-2025-11710 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11711/</URL>
      <Description>SUSE CVE CVE-2025-11711 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11712/</URL>
      <Description>SUSE CVE CVE-2025-11712 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11713/</URL>
      <Description>SUSE CVE CVE-2025-11713 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11714/</URL>
      <Description>SUSE CVE CVE-2025-11714 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-11715/</URL>
      <Description>SUSE CVE CVE-2025-11715 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-140.4.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-140.4.0-1.1">MozillaThunderbird-140.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-openpgp-librnp-140.4.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-openpgp-librnp-140.4.0-1.1">MozillaThunderbird-openpgp-librnp-140.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-140.4.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-140.4.0-1.1">MozillaThunderbird-translations-common-140.4.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-140.4.0-1.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-140.4.0-1.1">MozillaThunderbird-translations-other-140.4.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-140.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1">MozillaThunderbird-140.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-openpgp-librnp-140.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1">MozillaThunderbird-openpgp-librnp-140.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-140.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1">MozillaThunderbird-translations-common-140.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-140.4.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1">MozillaThunderbird-translations-other-140.4.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11708.html</URL>
        <Description>CVE-2025-11708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11709</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11709.html</URL>
        <Description>CVE-2025-11709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11710.html</URL>
        <Description>CVE-2025-11710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11711</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11711.html</URL>
        <Description>CVE-2025-11711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11712</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11712.html</URL>
        <Description>CVE-2025-11712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient escaping in the "Copy as cURL" feature could have been used to trick a user into executing unexpected code on Windows. This did not affect Firefox running on other operating systems. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11713.html</URL>
        <Description>CVE-2025-11713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 115.29, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11714.html</URL>
        <Description>CVE-2025-11714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 144, Firefox ESR &lt; 140.4, Thunderbird &lt; 144, and Thunderbird &lt; 140.4.</Note>
    </Notes>
    <CVE>CVE-2025-11715</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-openpgp-librnp-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-common-140.4.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaThunderbird-translations-other-140.4.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-11715.html</URL>
        <Description>CVE-2025-11715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1251263</URL>
        <Description>SUSE Bug 1251263</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
