Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MozillaThunderbird
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MozillaThunderbird
ID: SUSE-SU-2025:0405-1
Distribution: SUSE
Plattformen: SUSE Linux Enterprise Desktop 15 SP6, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Package Hub 15 15-SP6, SUSE Linux Enterprise Workstation Extension 15 SP6
Datum: Mo, 10. Februar 2025, 19:18
Referenzen: https://www.cve.org/CVERecord?id=CVE-2025-1016
https://www.cve.org/CVERecord?id=CVE-2025-1010
https://www.cve.org/CVERecord?id=CVE-2024-11704
https://www.cve.org/CVERecord?id=CVE-2025-1009
https://www.cve.org/CVERecord?id=CVE-2025-0510
https://www.cve.org/CVERecord?id=CVE-2025-1014
https://www.cve.org/CVERecord?id=CVE-2025-1012
https://www.cve.org/CVERecord?id=CVE-2025-1015
https://www.cve.org/CVERecord?id=CVE-2025-1013
https://www.cve.org/CVERecord?id=CVE-2025-1017
https://www.cve.org/CVERecord?id=CVE-2025-1011
Applikationen: Mozilla Thunderbird

Originalnachricht

--===============7491721168082746816==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for MozillaThunderbird

Announcement ID: SUSE-SU-2025:0405-1
Release Date: 2025-02-10T13:54:56Z
Rating: important
References:

* bsc#1236411
* bsc#1236539


Cross-References:

* CVE-2024-11704
* CVE-2025-0510
* CVE-2025-1009
* CVE-2025-1010
* CVE-2025-1011
* CVE-2025-1012
* CVE-2025-1013
* CVE-2025-1014
* CVE-2025-1015
* CVE-2025-1016
* CVE-2025-1017


CVSS scores:

* CVE-2024-11704 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-0510 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2025-0510 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2025-0510 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
* CVE-2025-1009 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2025-1009 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1009 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1010 ( SUSE ): 7.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
* CVE-2025-1010 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1010 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1011 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1011 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1011 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1012 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1012 ( NVD ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1012 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1013 ( SUSE ): 3.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N
* CVE-2025-1013 ( NVD ): 6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
* CVE-2025-1014 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
* CVE-2025-1014 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1014 ( NVD ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1015 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1015 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-1015 ( NVD ): 5.4 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
* CVE-2025-1016 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1016 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1016 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1017 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2025-1017 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
* CVE-2025-1017 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H


Affected Products:

* openSUSE Leap 15.6
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP6
* SUSE Linux Enterprise Workstation Extension 15 SP6
* SUSE Package Hub 15 15-SP6



An update that solves 11 vulnerabilities can now be installed.

## Description:

This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 128.7 (MFSA 2025-10, bsc#1236539).

Security fixes:

* CVE-2025-1009: use-after-free in XSLT.
* CVE-2025-1010: use-after-free in Custom Highlight.
* CVE-2025-1011: a bug in WebAssembly code generation could result in a
crash.
* CVE-2025-1012: use-after-free during concurrent delazification.
* CVE-2024-11704: potential double-free vulnerability in PKCS#7 decryption
handling.
* CVE-2025-1013: potential opening of private browsing tabs in normal
browsing
windows.
* CVE-2025-1014: certificate length was not properly checked.
* CVE-2025-1015: unsanitized address book fields.
* CVE-2025-0510: address of e-mail sender can be spoofed by malicious email.
* CVE-2025-1016: memory safety bugs.
* CVE-2025-1017: memory safety bugs.

Other fixes:

* fixed: images inside links could zoom when clicked instead of opening the
link.
* fixed: compacting an empty folder failed with write error.
* fixed: compacting of IMAP folder with corrupted local storage failed with
write error.
* fixed: after restart, all restored tabs with opened PDFs showed the same
attachment.
* fixed: exceptions during CalDAV item processing would halt subsequent item
handling.
* fixed: context menu was unable to move email address to a different field.
* fixed: link at about:rights pointed to Firefox privacy policy instead of
Thunderbird's.
* fixed: POP3 'fetch headers only' and 'get selected
messages' could delete
messages.
* fixed: 'Search Online' checkbox in saved search properties was
incorrectly
disabled.
* fixed: POP3 status message showed incorrect download count when messages
were deleted.
* fixed: space bar did not always advance to the next unread message.
* fixed: folder creation or renaming failed due to incorrect preference
settings.
* fixed: forwarding/editing S/MIME drafts/templates unusable due to
regression
(bsc#1236411).
* fixed: sort order in 'Search Messages' panel reset after search or
on first
launch.
* fixed: reply window added an unnecessary third blank line at the top.
* fixed: Thunderbird spell check box did not allow ENTER to accept suggested
changes.
* fixed: long email subject lines could overlap window control buttons on
macOS.
* fixed: flathub manifest link was not correct.
* fixed: 'Prefer client-side email scheduling' needed to be selected
twice.
* fixed: duplicate invitations were sent if CALDAV calendar email case did
not
match.
* fixed: visual and UX improvements.

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2025-405=1

* SUSE Package Hub 15 15-SP6
zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-405=1

* SUSE Linux Enterprise Workstation Extension 15 SP6
zypper in -t patch SUSE-SLE-Product-WE-15-SP6-2025-405=1

## Package List:

* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaThunderbird-128.7.0-150200.8.200.1
* MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-common-128.7.0-150200.8.200.1
* MozillaThunderbird-debugsource-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-other-128.7.0-150200.8.200.1
* SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
* MozillaThunderbird-128.7.0-150200.8.200.1
* MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-common-128.7.0-150200.8.200.1
* MozillaThunderbird-debugsource-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-other-128.7.0-150200.8.200.1
* SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
* MozillaThunderbird-128.7.0-150200.8.200.1
* MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-common-128.7.0-150200.8.200.1
* MozillaThunderbird-debugsource-128.7.0-150200.8.200.1
* MozillaThunderbird-translations-other-128.7.0-150200.8.200.1

## References:

* https://www.suse.com/security/cve/CVE-2024-11704.html
* https://www.suse.com/security/cve/CVE-2025-0510.html
* https://www.suse.com/security/cve/CVE-2025-1009.html
* https://www.suse.com/security/cve/CVE-2025-1010.html
* https://www.suse.com/security/cve/CVE-2025-1011.html
* https://www.suse.com/security/cve/CVE-2025-1012.html
* https://www.suse.com/security/cve/CVE-2025-1013.html
* https://www.suse.com/security/cve/CVE-2025-1014.html
* https://www.suse.com/security/cve/CVE-2025-1015.html
* https://www.suse.com/security/cve/CVE-2025-1016.html
* https://www.suse.com/security/cve/CVE-2025-1017.html
* https://bugzilla.suse.com/show_bug.cgi?id=1236411
* https://bugzilla.suse.com/show_bug.cgi?id=1236539


--===============7491721168082746816==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for MozillaThunderbird</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2025:0405-1</td>
</tr>
<tr>
<th>Release Date:</th>
<td>2025-02-10T13:54:56Z</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236411">bsc#1236411</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236539">bsc#1236539</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-11704.html">CVE-2024-11704</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-0510.html">CVE-2025-0510</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1009.html">CVE-2025-1009</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1010.html">CVE-2025-1010</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1011.html">CVE-2025-1011</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1012.html">CVE-2025-1012</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1013.html">CVE-2025-1013</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1014.html">CVE-2025-1014</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1015.html">CVE-2025-1015</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1016.html">CVE-2025-1016</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2025-1017.html">CVE-2025-1017</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-11704</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-0510</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-0510</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-0510</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1009</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1009</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1010</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.6</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1010</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1011</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1011</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1011</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1012</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1012</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1012</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1013</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1013</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">6.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1014</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.3</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1014</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1014</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1015</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1015</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1015</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">5.4</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1016</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1016</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1016</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1017</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2025-1017</span>
<span class="cvss-source">
(

NVD

):
</span>
<span
class="cvss-score">9.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Workstation Extension 15 SP6</li>

<li class="list-group-item">SUSE Package
Hub 15 15-SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 11 vulnerabilities can now be
installed.</p>





<h2>Description:</h2>

<p>This update for MozillaThunderbird fixes the following
issues:</p>
<p>Update to Mozilla Thunderbird 128.7 (MFSA 2025-10,
bsc#1236539).</p>
<p>Security fixes:</p>
<ul>
<li>CVE-2025-1009: use-after-free in XSLT.</li>
<li>CVE-2025-1010: use-after-free in Custom Highlight.</li>
<li>CVE-2025-1011: a bug in WebAssembly code generation could result in a
crash.</li>
<li>CVE-2025-1012: use-after-free during concurrent
delazification.</li>
<li>CVE-2024-11704: potential double-free vulnerability in PKCS#7
decryption handling.</li>
<li>CVE-2025-1013: potential opening of private browsing tabs in normal
browsing windows.</li>
<li>CVE-2025-1014: certificate length was not properly
checked.</li>
<li>CVE-2025-1015: unsanitized address book fields.</li>
<li>CVE-2025-0510: address of e-mail sender can be spoofed by malicious
email.</li>
<li>CVE-2025-1016: memory safety bugs.</li>
<li>CVE-2025-1017: memory safety bugs.</li>
</ul>
<p>Other fixes:</p>
<ul>
<li>fixed: images inside links could zoom when clicked instead of opening
the link.</li>
<li>fixed: compacting an empty folder failed with write error.</li>
<li>fixed: compacting of IMAP folder with corrupted local storage failed
with write error.</li>
<li>fixed: after restart, all restored tabs with opened PDFs showed the
same attachment.</li>
<li>fixed: exceptions during CalDAV item processing would halt subsequent
item handling.</li>
<li>fixed: context menu was unable to move email address to a different
field.</li>
<li>fixed: link at about:rights pointed to Firefox privacy policy instead
of Thunderbird&#x27;s.</li>
<li>fixed: POP3 &#x27;fetch headers only&#x27; and &#x27;get
selected messages&#x27; could delete messages.</li>
<li>fixed: &#x27;Search Online&#x27; checkbox in saved search
properties was incorrectly disabled.</li>
<li>fixed: POP3 status message showed incorrect download count when
messages were deleted.</li>
<li>fixed: space bar did not always advance to the next unread
message.</li>
<li>fixed: folder creation or renaming failed due to incorrect preference
settings.</li>
<li>fixed: forwarding/editing S/MIME drafts/templates unusable due to
regression (bsc#1236411).</li>
<li>fixed: sort order in &#x27;Search Messages&#x27; panel reset
after search or on first launch.</li>
<li>fixed: reply window added an unnecessary third blank line at the
top.</li>
<li>fixed: Thunderbird spell check box did not allow ENTER to accept
suggested changes.</li>
<li>fixed: long email subject lines could overlap window control buttons
on macOS.</li>
<li>fixed: flathub manifest link was not correct.</li>
<li>fixed: &#x27;Prefer client-side email scheduling&#x27; needed
to be selected twice.</li>
<li>fixed: duplicate invitations were sent if CALDAV calendar email case
did not match.</li>
<li>fixed: visual and UX improvements.</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.6-2025-405=1</code>



</li>

<li class="list-group-item">
SUSE Package Hub 15 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-405=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Workstation Extension 15 SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-WE-15-SP6-2025-405=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>MozillaThunderbird-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-common-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debugsource-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-other-128.7.0-150200.8.200.1</li>

</ul>
</li>



<li>
SUSE Package Hub 15 15-SP6 (aarch64 ppc64le s390x)
<ul>


<li>MozillaThunderbird-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-common-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debugsource-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-other-128.7.0-150200.8.200.1</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Workstation Extension 15 SP6 (x86_64)
<ul>


<li>MozillaThunderbird-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debuginfo-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-common-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-debugsource-128.7.0-150200.8.200.1</li>


<li>MozillaThunderbird-translations-other-128.7.0-150200.8.200.1</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2024-11704.html">https://www.suse.com/security/cve/CVE-2024-11704.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-0510.html">https://www.suse.com/security/cve/CVE-2025-0510.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1009.html">https://www.suse.com/security/cve/CVE-2025-1009.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1010.html">https://www.suse.com/security/cve/CVE-2025-1010.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1011.html">https://www.suse.com/security/cve/CVE-2025-1011.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1012.html">https://www.suse.com/security/cve/CVE-2025-1012.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1013.html">https://www.suse.com/security/cve/CVE-2025-1013.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1014.html">https://www.suse.com/security/cve/CVE-2025-1014.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1015.html">https://www.suse.com/security/cve/CVE-2025-1015.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1016.html">https://www.suse.com/security/cve/CVE-2025-1016.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2025-1017.html">https://www.suse.com/security/cve/CVE-2025-1017.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236411">https://bugzilla.suse.com/show_bug.cgi?id=1236411</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1236539">https://bugzilla.suse.com/show_bug.cgi?id=1236539</a>
</li>


</ul>

</div>

--===============7491721168082746816==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung