SUSE SLED15 / SLES15 / openSUSE 15 Security Update : MozillaThunderbird (SUSE-SU-2025:02546-1)

critical Nessus Plugin ID 243222

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLED15 / SLED_SAP15 / SLES15 / SLES_SAP15 / openSUSE 15 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2025:02546-1 advisory.

Update to Mozilla Thunderbird 140.1 (MFSA 2025-63) (bsc#1246664):

- CVE-2025-8027: JavaScript engine only wrote partial return value to stack (bmo#1968423)
- CVE-2025-8028: Large branch table could lead to truncated instruction (bmo#1971581)
- CVE-2025-8029: javascript: URLs executed on object and embed tags (bmo#1928021)
- CVE-2025-8036: DNS rebinding circumvents CORS (bmo#1960834)
- CVE-2025-8037: Nameless cookies shadow secure cookies (bmo#1964767)
- CVE-2025-8030: Potential user-assisted code execution in 'Copy as cURL' command (bmo#1968414)
- CVE-2025-8031: Incorrect URL stripping in CSP reports (bmo#1971719)
- CVE-2025-8032: XSLT documents could bypass CSP (bmo#1974407)
- CVE-2025-8038: CSP frame-src was not correctly enforced for paths (bmo#1808979)
- CVE-2025-8039: Search terms persisted in URL bar (bmo#1970997)
- CVE-2025-8033: Incorrect JavaScript state machine for generators (bmo#1973990)
- CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1970422, bmo#1970422, bmo#1970422, bmo#1970422)
- CVE-2025-8040: Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1975058, bmo#1975058, bmo#1975998, bmo#1975998)
- CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1975961, bmo#1975961, bmo#1975961)

Update to Mozilla Thunderbird 140.0.1 (MFSA 2025-54) (bsc#1244670):

- CVE-2025-6424: Use-after-free in FontFaceSet (bmo#1966423)
- CVE-2025-6425: The WebCompat WebExtension shipped exposed a persistent UUID (bmo#1717672)
- CVE-2025-6426: No warning when opening executable terminal files on macOS (bmo#1964385)
- CVE-2025-6427: connect-src Content Security Policy restriction could be bypassed (bmo#1966927)
- CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of youtube.com (bmo#1970658)
- CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag (bmo#1971140)
- CVE-2025-6432: DNS Requests leaked outside of a configured SOCKS proxy (bmo#1943804)
- CVE-2025-6433: WebAuthn would allow a user to sign a challenge on a webpage with an invalid TLS certificate (bmo#1954033)
- CVE-2025-6434: HTTPS-Only exception screen lacked anti-clickjacking delay (bmo#1955182)
- CVE-2025-6435: Save as in Devtools could download files without sanitizing the extension (bmo#1950056, bmo#1961777)
- CVE-2025-6436: Memory safety bugs fixed in Firefox 140 and Thunderbird 140 (bmo#1941377, bmo#1960948, bmo#1966187, bmo#1966505, bmo#1970764)

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected MozillaThunderbird, MozillaThunderbird-translations-common and / or MozillaThunderbird-translations- other packages.

See Also

https://www.suse.com/security/cve/CVE-2025-8035

https://www.suse.com/security/cve/CVE-2025-8036

https://www.suse.com/security/cve/CVE-2025-8037

https://www.suse.com/security/cve/CVE-2025-8038

https://www.suse.com/security/cve/CVE-2025-8039

https://www.suse.com/security/cve/CVE-2025-8040

https://bugzilla.suse.com/1244670

https://bugzilla.suse.com/1246664

https://lists.suse.com/pipermail/sle-updates/2025-July/040955.html

https://www.suse.com/security/cve/CVE-2025-6424

https://www.suse.com/security/cve/CVE-2025-6425

https://www.suse.com/security/cve/CVE-2025-6426

https://www.suse.com/security/cve/CVE-2025-6427

https://www.suse.com/security/cve/CVE-2025-6429

https://www.suse.com/security/cve/CVE-2025-6430

https://www.suse.com/security/cve/CVE-2025-6432

https://www.suse.com/security/cve/CVE-2025-6433

https://www.suse.com/security/cve/CVE-2025-6434

https://www.suse.com/security/cve/CVE-2025-6435

https://www.suse.com/security/cve/CVE-2025-6436

https://www.suse.com/security/cve/CVE-2025-8027

https://www.suse.com/security/cve/CVE-2025-8028

https://www.suse.com/security/cve/CVE-2025-8029

https://www.suse.com/security/cve/CVE-2025-8030

https://www.suse.com/security/cve/CVE-2025-8031

https://www.suse.com/security/cve/CVE-2025-8032

https://www.suse.com/security/cve/CVE-2025-8033

https://www.suse.com/security/cve/CVE-2025-8034

Plugin Details

Severity: Critical

ID: 243222

File Name: suse_SU-2025-02546-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 7/31/2025

Updated: 7/31/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2025-8040

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS Score Source: CVE-2025-8038

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:15, p-cpe:/a:novell:suse_linux:mozillathunderbird, p-cpe:/a:novell:suse_linux:mozillathunderbird-translations-common, p-cpe:/a:novell:suse_linux:mozillathunderbird-translations-other

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Ease: No known exploits are available

Patch Publication Date: 7/30/2025

Vulnerability Publication Date: 6/24/2025

Reference Information

CVE: CVE-2025-6424, CVE-2025-6425, CVE-2025-6426, CVE-2025-6427, CVE-2025-6429, CVE-2025-6430, CVE-2025-6432, CVE-2025-6433, CVE-2025-6434, CVE-2025-6435, CVE-2025-6436, CVE-2025-8027, CVE-2025-8028, CVE-2025-8029, CVE-2025-8030, CVE-2025-8031, CVE-2025-8032, CVE-2025-8033, CVE-2025-8034, CVE-2025-8035, CVE-2025-8036, CVE-2025-8037, CVE-2025-8038, CVE-2025-8039, CVE-2025-8040

SuSE: SUSE-SU-2025:02546-1