<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for mozjs128</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:21170-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-12-03T20:38:36Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-12-03T20:38:36Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-12-03T20:38:36Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for mozjs128</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for mozjs128 fixes the following issues:

- Update to version 128.14.0 (bsc#1248162):
  + CVE-2025-9179: Sandbox escape due to invalid pointer in the
    Audio/Video: GMP component
  + CVE-2025-9180: Same-origin policy bypass in the Graphics:
    Canvas2D component
  + CVE-2025-9181: Uninitialized memory in the JavaScript Engine
    component
  + CVE-2025-9185: Memory safety bugs fixed in Firefox ESR 115.27,
    Firefox ESR 128.14, Thunderbird ESR 128.14, Firefox ESR 140.2,
    Thunderbird ESR 140.2, Firefox 142 and Thunderbird 142

- Update to version 128.13.0:
  + CVE-2025-8027: JavaScript engine only wrote partial return
    value to stack
  + CVE-2025-8028: Large branch table could lead to truncated
    instruction
  + CVE-2025-8029: javascript: URLs executed on object and embed
    tags
  + CVE-2025-8030: Potential user-assisted code execution in “Copy
    as cURL” command
  + CVE-2025-8031: Incorrect URL stripping in CSP reports
  + CVE-2025-8032: XSLT documents could bypass CSP
  + CVE-2025-8033: Incorrect JavaScript state machine for
    generators
  + CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26,
    Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1,
    Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141
  + CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13,
    Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR
    140.1, Firefox 141 and Thunderbird 141

- Update to version 128.12.0:
  + CVE-2025-6424: Use-after-free in FontFaceSet
  + CVE-2025-6425: The WebCompat WebExtension shipped with Firefox
    exposed a persistent UUID
  + CVE-2025-6426: No warning when opening executable terminal
    files on macOS
  + CVE-2025-6429: Incorrect parsing of URLs could have allowed
    embedding of youtube.com
  + CVE-2025-6430: Content-Disposition header ignored when a file
    is included in an embed or object tag

- Update to version 128.11.0:
  + CVE-2025-5283: Double-free in libvpx encoder
  + CVE-2025-5263: Error handling for script execution was
    incorrectly isolated from web content
  + CVE-2025-5264: Potential local code execution in “Copy as cURL”
    command
  + CVE-2025-5265: Potential local code execution in “Copy as cURL”
    command
  + CVE-2025-5266: Script element events leaked cross-origin
    resource status
  + CVE-2025-5267: Clickjacking vulnerability could have led to
    leaking saved payment card details
  + CVE-2025-5268: Memory safety bugs fixed in Firefox 139,
    Thunderbird 139, Firefox ESR 128.11, and Thunderbird 128.11
  + CVE-2025-5269: Memory safety bug fixed in Firefox ESR 128.11
    and Thunderbird 128.11
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLES-16.0-93</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      <Description>Link for SUSE-SU-2025:21170-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-December/023500.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:21170-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1248162</URL>
      <Description>SUSE Bug 1248162</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5263/</URL>
      <Description>SUSE CVE CVE-2025-5263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5264/</URL>
      <Description>SUSE CVE CVE-2025-5264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5265/</URL>
      <Description>SUSE CVE CVE-2025-5265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5266/</URL>
      <Description>SUSE CVE CVE-2025-5266 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5267/</URL>
      <Description>SUSE CVE CVE-2025-5267 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5268/</URL>
      <Description>SUSE CVE CVE-2025-5268 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5269/</URL>
      <Description>SUSE CVE CVE-2025-5269 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5283/</URL>
      <Description>SUSE CVE CVE-2025-5283 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6424/</URL>
      <Description>SUSE CVE CVE-2025-6424 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6425/</URL>
      <Description>SUSE CVE CVE-2025-6425 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6426/</URL>
      <Description>SUSE CVE CVE-2025-6426 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6429/</URL>
      <Description>SUSE CVE CVE-2025-6429 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6430/</URL>
      <Description>SUSE CVE CVE-2025-6430 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8027/</URL>
      <Description>SUSE CVE CVE-2025-8027 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8028/</URL>
      <Description>SUSE CVE CVE-2025-8028 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8029/</URL>
      <Description>SUSE CVE CVE-2025-8029 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8030/</URL>
      <Description>SUSE CVE CVE-2025-8030 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8031/</URL>
      <Description>SUSE CVE CVE-2025-8031 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8032/</URL>
      <Description>SUSE CVE CVE-2025-8032 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8033/</URL>
      <Description>SUSE CVE CVE-2025-8033 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8034/</URL>
      <Description>SUSE CVE CVE-2025-8034 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8035/</URL>
      <Description>SUSE CVE CVE-2025-8035 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9179/</URL>
      <Description>SUSE CVE CVE-2025-9179 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9180/</URL>
      <Description>SUSE CVE CVE-2025-9180 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9181/</URL>
      <Description>SUSE CVE CVE-2025-9181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9185/</URL>
      <Description>SUSE CVE CVE-2025-9185 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server 16.0" CPE="cpe:/o:suse:sles:16.0">SUSE Linux Enterprise Server 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0">SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libmozjs-128-0-128.14.0-160000.1.1">
      <FullProductName ProductID="libmozjs-128-0-128.14.0-160000.1.1">libmozjs-128-0-128.14.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs128-128.14.0-160000.1.1">
      <FullProductName ProductID="mozjs128-128.14.0-160000.1.1">mozjs128-128.14.0-160000.1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozjs128-devel-128.14.0-160000.1.1">
      <FullProductName ProductID="mozjs128-devel-128.14.0-160000.1.1">mozjs128-devel-128.14.0-160000.1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libmozjs-128-0-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1">libmozjs-128-0-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1">mozjs128-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-devel-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1">mozjs128-devel-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="libmozjs-128-0-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1">libmozjs-128-0-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1">mozjs128-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozjs128-devel-128.14.0-160000.1.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1">mozjs128-devel-128.14.0-160000.1.1 as a component of SUSE Linux Enterprise Server for SAP Applications 16.0</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Error handling for script execution was incorrectly isolated from web content, which could have allowed cross-origin leak attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5263.html</URL>
        <Description>CVE-2025-5263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the newline character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5264.html</URL>
        <Description>CVE-2025-5264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to insufficient escaping of the ampersand character in the "Copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system.
*This bug only affects Firefox for Windows. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 115.24, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5265.html</URL>
        <Description>CVE-2025-5265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Script elements loading cross-origin resources generated load and error events which leaked information enabling XS-Leaks attacks. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5266</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5266.html</URL>
        <Description>CVE-2025-5266</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A clickjacking vulnerability could have been used to trick a user into leaking saved payment card details to a malicious page. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5267</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5267.html</URL>
        <Description>CVE-2025-5267</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 139, Firefox ESR &lt; 128.11, Thunderbird &lt; 139, and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5268</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5268.html</URL>
        <Description>CVE-2025-5268</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bug present in Firefox ESR 128.10, and Thunderbird 128.10. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 128.11 and Thunderbird &lt; 128.11.</Note>
    </Notes>
    <CVE>CVE-2025-5269</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5269.html</URL>
        <Description>CVE-2025-5269</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243353</URL>
        <Description>SUSE Bug 1243353</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use after free in libvpx in Google Chrome prior to 137.0.7151.55 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)</Note>
    </Notes>
    <CVE>CVE-2025-5283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5283.html</URL>
        <Description>CVE-2025-5283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1243741</URL>
        <Description>SUSE Bug 1243741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 115.25, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6424</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6424.html</URL>
        <Description>CVE-2025-6424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 115.25, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6425</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6425.html</URL>
        <Description>CVE-2025-6425</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The executable file warning did not warn users before opening files with the `terminal` extension. 
*This bug only affects Firefox for macOS. Other versions of Firefox are unaffected.* This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6426</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6426.html</URL>
        <Description>CVE-2025-6426</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an `embed` tag.  This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6429</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6429.html</URL>
        <Description>CVE-2025-6429</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When a file download is specified via the `Content-Disposition` header, that directive would be ignored if the file was included via a `&amp;lt;embed&amp;gt;` or `&amp;lt;object&amp;gt;` tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox &lt; 140, Firefox ESR &lt; 128.12, Thunderbird &lt; 140, and Thunderbird &lt; 128.12.</Note>
    </Notes>
    <CVE>CVE-2025-6430</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6430.html</URL>
        <Description>CVE-2025-6430</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1244670</URL>
        <Description>SUSE Bug 1244670</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8027</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8027.html</URL>
        <Description>CVE-2025-8027</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8028</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8028.html</URL>
        <Description>CVE-2025-8028</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Thunderbird executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8029</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8029.html</URL>
        <Description>CVE-2025-8029</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient escaping in the "Copy as cURL" feature could potentially be used to trick a user into executing unexpected code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8030</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8030.html</URL>
        <Description>CVE-2025-8030</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8031</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8031.html</URL>
        <Description>CVE-2025-8031</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XSLT document loading did not correctly propagate the source document which bypassed its CSP. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8032</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8032.html</URL>
        <Description>CVE-2025-8032</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr deref. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8033</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8033.html</URL>
        <Description>CVE-2025-8033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8034</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8034.html</URL>
        <Description>CVE-2025-8034</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
    </Notes>
    <CVE>CVE-2025-8035</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8035.html</URL>
        <Description>CVE-2025-8035</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1246664</URL>
        <Description>SUSE Bug 1246664</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker was able to perform memory corruption in the GMP process which processes encrypted media. This process is also heavily sandboxed, but represents slightly different privileges from the content process. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
    </Notes>
    <CVE>CVE-2025-9179</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9179.html</URL>
        <Description>CVE-2025-9179</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248162</URL>
        <Description>SUSE Bug 1248162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Same-origin policy bypass in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
    </Notes>
    <CVE>CVE-2025-9180</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9180.html</URL>
        <Description>CVE-2025-9180</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248162</URL>
        <Description>SUSE Bug 1248162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
    </Notes>
    <CVE>CVE-2025-9181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9181.html</URL>
        <Description>CVE-2025-9181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248162</URL>
        <Description>SUSE Bug 1248162</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
    </Notes>
    <CVE>CVE-2025-9185</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:libmozjs-128-0-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-128.14.0-160000.1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 16.0:mozjs128-devel-128.14.0-160000.1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-202521170-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9185.html</URL>
        <Description>CVE-2025-9185</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1248162</URL>
        <Description>SUSE Bug 1248162</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
