--===============6147607879774794075== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
# Security update for MozillaThunderbird
Announcement ID: SUSE-SU-2025:0080-1 Release Date: 2025-01-13T15:31:02Z Rating: important References:
* bsc#1234991
Cross-References:
* CVE-2025-0237 * CVE-2025-0238 * CVE-2025-0239 * CVE-2025-0240 * CVE-2025-0241 * CVE-2025-0242 * CVE-2025-0243
CVSS scores:
* CVE-2025-0237 ( SUSE ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0237 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0238 ( SUSE ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-0238 ( NVD ): 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N * CVE-2025-0239 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0239 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0240 ( SUSE ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0240 ( NVD ): 4.0 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N * CVE-2025-0242 ( SUSE ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0242 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0243 ( SUSE ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N * CVE-2025-0243 ( NVD ): 5.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
Affected Products:
* openSUSE Leap 15.6 * SUSE Linux Enterprise Desktop 15 SP6 * SUSE Linux Enterprise Real Time 15 SP6 * SUSE Linux Enterprise Server 15 SP6 * SUSE Linux Enterprise Server for SAP Applications 15 SP6 * SUSE Linux Enterprise Workstation Extension 15 SP6 * SUSE Package Hub 15 15-SP6
An update that solves seven vulnerabilities can now be installed.
## Description:
This update for MozillaThunderbird fixes the following issues:
Update to Mozilla Thunderbird ESR 128.6 (MFSA 2025-05, bsc#1234991)
Security fixes:
* CVE-2025-0237 (bmo#1915257) WebChannel APIs susceptible to confused deputy attack * CVE-2025-0238 (bmo#1915535) Use-after-free when breaking lines in text * CVE-2025-0239 (bmo#1929156) Alt-Svc ALPN validation failure when redirected * CVE-2025-0240 (bmo#1929623) Compartment mismatch when parsing JavaScript JSON module * CVE-2025-0241 (bmo#1933023) Memory corruption when using JavaScript Text Segmentation * CVE-2025-0242 (bmo#1874523, bmo#1926454, bmo#1931873, bmo#1932169) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6 * CVE-2025-0243 (bmo#1827142, bmo#1932783) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6
Other fixes:
* fixed: New mail notification was not hidden after reading the new message (bmo#1920077) * fixed: New mail notification could show for the wrong folder, causing repeated alerts (bmo#1926462) * fixed: macOS shortcut CMD+1 did not restore the main window when it was minimized (bmo#1857953) * fixed: Clicking the context menu "Reply" button resulted in "Reply-All" (bmo#1935883) * fixed: Switching from "All", "Unread", and "Threads with unread" did not work (bmo#1921618) * fixed: Downloading message headers from a newsgroup could cause a hang (bmo#1931661) * fixed: Message list performance slow when many updates happened at once (bmo#1933104) * fixed: "mailto:" links did not apply the compose format of the current identity (bmo#550414) * fixed: Authentication failure of AUTH PLAIN or AUTH LOGIN did not fall back to USERPASS (bmo#1928026)
## Patch Instructions:
To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch". Alternatively you can run the command listed for your product:
* openSUSE Leap 15.6 zypper in -t patch openSUSE-SLE-15.6-2025-80=1
* SUSE Package Hub 15 15-SP6 zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-80=1
* SUSE Linux Enterprise Workstation Extension 15 SP6 zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-80=1
## Package List:
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) * MozillaThunderbird-128.6.0-150200.8.197.1 * MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1 * MozillaThunderbird-debugsource-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-other-128.6.0-150200.8.197.1 * SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) * MozillaThunderbird-128.6.0-150200.8.197.1 * MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1 * MozillaThunderbird-debugsource-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-other-128.6.0-150200.8.197.1 * SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) * MozillaThunderbird-128.6.0-150200.8.197.1 * MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1 * MozillaThunderbird-debugsource-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-common-128.6.0-150200.8.197.1 * MozillaThunderbird-translations-other-128.6.0-150200.8.197.1
## References:
* https://www.suse.com/security/cve/CVE-2025-0237.html * https://www.suse.com/security/cve/CVE-2025-0238.html * https://www.suse.com/security/cve/CVE-2025-0239.html * https://www.suse.com/security/cve/CVE-2025-0240.html * https://www.suse.com/security/cve/CVE-2025-0241.html * https://www.suse.com/security/cve/CVE-2025-0242.html * https://www.suse.com/security/cve/CVE-2025-0243.html * https://bugzilla.suse.com/show_bug.cgi?id=1234991
--===============6147607879774794075== Content-Type: text/html; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit
<div class="container"> <h1>Security update for MozillaThunderbird</h1>
<table class="table table-striped table-bordered"> <tbody> <tr> <th>Announcement ID:</th> <td>SUSE-SU-2025:0080-1</td> </tr> <tr> <th>Release Date:</th> <td>2025-01-13T15:31:02Z</td> </tr> <tr> <th>Rating:</th> <td>important</td> </tr> <tr> <th>References:</th> <td> <ul> <li style="display: inline;"> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234991">bsc#1234991</a> </li> </ul> </td> </tr> <tr> <th> Cross-References: </th> <td> <ul> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0237.html">CVE-2025-0237</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0238.html">CVE-2025-0238</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0239.html">CVE-2025-0239</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0240.html">CVE-2025-0240</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0241.html">CVE-2025-0241</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0242.html">CVE-2025-0242</a> </li> <li style="display: inline;"> <a href="https://www.suse.com/security/cve/CVE-2025-0243.html">CVE-2025-0243</a> </li> </ul> </td> </tr> <tr> <th>CVSS scores:</th> <td> <ul class="list-group"> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0237</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0237</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.4</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0238</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0238</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.3</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0239</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0239</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0240</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0240</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">4.0</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0242</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0242</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">6.5</span> <span class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0243</span> <span class="cvss-source"> ( SUSE ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> <li class="list-group-item"> <span class="cvss-reference">CVE-2025-0243</span> <span class="cvss-source"> ( NVD ): </span> <span class="cvss-score">5.1</span> <span class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span> </li> </ul> </td> </tr> <tr> <th>Affected Products:</th> <td> <ul class="list-group"> <li class="list-group-item">openSUSE Leap 15.6</li> <li class="list-group-item">SUSE Linux Enterprise Desktop 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Real Time 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Server for SAP Applications 15 SP6</li> <li class="list-group-item">SUSE Linux Enterprise Workstation Extension 15 SP6</li> <li class="list-group-item">SUSE Package Hub 15 15-SP6</li> </ul> </td> </tr> </tbody> </table>
<p>An update that solves seven vulnerabilities can now be installed.</p>
<h2>Description:</h2> <p>This update for MozillaThunderbird fixes the following issues:</p> <p>Update to Mozilla Thunderbird ESR 128.6 (MFSA 2025-05, bsc#1234991)</p> <p>Security fixes:</p> <ul> <li>CVE-2025-0237 (bmo#1915257) WebChannel APIs susceptible to confused deputy attack</li> <li>CVE-2025-0238 (bmo#1915535) Use-after-free when breaking lines in text</li> <li>CVE-2025-0239 (bmo#1929156) Alt-Svc ALPN validation failure when redirected</li> <li>CVE-2025-0240 (bmo#1929623) Compartment mismatch when parsing JavaScript JSON module</li> <li>CVE-2025-0241 (bmo#1933023) Memory corruption when using JavaScript Text Segmentation</li> <li>CVE-2025-0242 (bmo#1874523, bmo#1926454, bmo#1931873, bmo#1932169) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6</li> <li>CVE-2025-0243 (bmo#1827142, bmo#1932783) Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6</li> </ul> <p>Other fixes:</p> <ul> <li>fixed: New mail notification was not hidden after reading the new message (bmo#1920077)</li> <li>fixed: New mail notification could show for the wrong folder, causing repeated alerts (bmo#1926462)</li> <li>fixed: macOS shortcut CMD+1 did not restore the main window when it was minimized (bmo#1857953)</li> <li>fixed: Clicking the context menu "Reply" button resulted in "Reply-All" (bmo#1935883)</li> <li>fixed: Switching from "All", "Unread", and "Threads with unread" did not work (bmo#1921618)</li> <li>fixed: Downloading message headers from a newsgroup could cause a hang (bmo#1931661)</li> <li>fixed: Message list performance slow when many updates happened at once (bmo#1933104)</li> <li>fixed: "mailto:" links did not apply the compose format of the current identity (bmo#550414)</li> <li>fixed: Authentication failure of AUTH PLAIN or AUTH LOGIN did not fall back to USERPASS (bmo#1928026)</li> </ul>
<h2>Patch Instructions:</h2> <p> To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".<br/>
Alternatively you can run the command listed for your product: </p> <ul class="list-group"> <li class="list-group-item"> openSUSE Leap 15.6 <br/> <code>zypper in -t patch openSUSE-SLE-15.6-2025-80=1</code> </li> <li class="list-group-item"> SUSE Package Hub 15 15-SP6 <br/> <code>zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-80=1</code> </li> <li class="list-group-item"> SUSE Linux Enterprise Workstation Extension 15 SP6 <br/> <code>zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-80=1</code> </li> </ul>
<h2>Package List:</h2> <ul> <li> openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64) <ul> <li>MozillaThunderbird-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debugsource-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</li> </ul> </li> <li> SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x) <ul> <li>MozillaThunderbird-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debugsource-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</li> </ul> </li> <li> SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64) <ul> <li>MozillaThunderbird-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debuginfo-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-debugsource-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-common-128.6.0-150200.8.197.1</li> <li>MozillaThunderbird-translations-other-128.6.0-150200.8.197.1</li> </ul> </li> </ul>
<h2>References:</h2> <ul> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0237.html">https://www.suse.com/security/cve/CVE-2025-0237.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0238.html">https://www.suse.com/security/cve/CVE-2025-0238.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0239.html">https://www.suse.com/security/cve/CVE-2025-0239.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0240.html">https://www.suse.com/security/cve/CVE-2025-0240.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0241.html">https://www.suse.com/security/cve/CVE-2025-0241.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0242.html">https://www.suse.com/security/cve/CVE-2025-0242.html</a> </li> <li> <a href="https://www.suse.com/security/cve/CVE-2025-0243.html">https://www.suse.com/security/cve/CVE-2025-0243.html</a> </li> <li> <a href="https://bugzilla.suse.com/show_bug.cgi?id=1234991">https://bugzilla.suse.com/show_bug.cgi?id=1234991</a> </li> </ul> </div>
--===============6147607879774794075==--
|