<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:0080-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-01-13T15:30:55Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-01-13T15:30:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-01-13T15:30:55Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird ESR 128.6 (MFSA 2025-05, bsc#1234991)

Security fixes:

  - CVE-2025-0237 (bmo#1915257)
    WebChannel APIs susceptible to confused deputy attack
  - CVE-2025-0238 (bmo#1915535)
    Use-after-free when breaking lines in text
  - CVE-2025-0239 (bmo#1929156)
    Alt-Svc ALPN validation failure when redirected
  - CVE-2025-0240 (bmo#1929623)
    Compartment mismatch when parsing JavaScript JSON module
  - CVE-2025-0241 (bmo#1933023)
    Memory corruption when using JavaScript Text Segmentation
  - CVE-2025-0242 (bmo#1874523, bmo#1926454, bmo#1931873,
    bmo#1932169)
    Memory safety bugs fixed in Firefox 134, Thunderbird 134,
    Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19,
    and Thunderbird 128.6
  - CVE-2025-0243 (bmo#1827142, bmo#1932783)
    Memory safety bugs fixed in Firefox 134, Thunderbird 134,
    Firefox ESR 128.6, and Thunderbird 128.6

Other fixes:

  - fixed: New mail notification was not hidden after reading the
    new message (bmo#1920077)
  - fixed: New mail notification could show for the wrong folder,
    causing repeated alerts (bmo#1926462)
  - fixed: macOS shortcut CMD+1 did not restore the main window
    when it was minimized (bmo#1857953)
  - fixed: Clicking the context menu 'Reply' button resulted in
    'Reply-All' (bmo#1935883)
  - fixed: Switching from 'All', 'Unread', and 'Threads with
    unread' did not work (bmo#1921618)
  - fixed: Downloading message headers from a newsgroup could
    cause a hang (bmo#1931661)
  - fixed: Message list performance slow when many updates
    happened at once (bmo#1933104)
  - fixed: 'mailto:' links did not apply the compose format of
    the current identity (bmo#550414)
  - fixed: Authentication failure of AUTH PLAIN or AUTH LOGIN did
    not fall back to USERPASS (bmo#1928026)

</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2025-80,SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-80,SUSE-SLE-Product-WE-15-SP6-2025-80,openSUSE-SLE-15.6-2025-80</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      <Description>Link for SUSE-SU-2025:0080-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-January/020098.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:0080-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1234991</URL>
      <Description>SUSE Bug 1234991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0237/</URL>
      <Description>SUSE CVE CVE-2025-0237 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0238/</URL>
      <Description>SUSE CVE CVE-2025-0238 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0239/</URL>
      <Description>SUSE CVE CVE-2025-0239 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0240/</URL>
      <Description>SUSE CVE CVE-2025-0240 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0241/</URL>
      <Description>SUSE CVE CVE-2025-0241 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0242/</URL>
      <Description>SUSE CVE CVE-2025-0242 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-0243/</URL>
      <Description>SUSE CVE CVE-2025-0243 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6" CPE="cpe:/o:suse:packagehub:15:sp6">SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 15 SP6">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 15 SP6">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP6" CPE="cpe:/o:suse:sle-we:15:sp6">SUSE Linux Enterprise Workstation Extension 15 SP6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-128.6.0-150200.8.197.1">
      <FullProductName ProductID="MozillaThunderbird-128.6.0-150200.8.197.1">MozillaThunderbird-128.6.0-150200.8.197.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-128.6.0-150200.8.197.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-128.6.0-150200.8.197.1">MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-128.6.0-150200.8.197.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-128.6.0-150200.8.197.1">MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1">MozillaThunderbird-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1">MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1">MozillaThunderbird-translations-other-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1">MozillaThunderbird-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1">MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP6">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1">MozillaThunderbird-translations-other-128.6.0-150200.8.197.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1">MozillaThunderbird-128.6.0-150200.8.197.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1">MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-128.6.0-150200.8.197.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1">MozillaThunderbird-translations-other-128.6.0-150200.8.197.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0237</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0237.html</URL>
        <Description>CVE-2025-0237</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Firefox ESR &lt; 115.19, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0238</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0238.html</URL>
        <Description>CVE-2025-0238</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0239</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0239.html</URL>
        <Description>CVE-2025-0239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0240</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0240.html</URL>
        <Description>CVE-2025-0240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0241</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0241.html</URL>
        <Description>CVE-2025-0241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Firefox ESR &lt; 115.19, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0242</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0242.html</URL>
        <Description>CVE-2025-0242</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 134, Firefox ESR &lt; 128.6, Thunderbird &lt; 134, and Thunderbird &lt; 128.6.</Note>
    </Notes>
    <CVE>CVE-2025-0243</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</ProductID>
        <ProductID>openSUSE Leap 15.6:MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20250080-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-0243.html</URL>
        <Description>CVE-2025-0243</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1234991</URL>
        <Description>SUSE Bug 1234991</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
