<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2024:1437-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-04-25T17:26:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-04-25T17:26:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-04-25T17:26:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

Update to Mozilla Thunderbird 115.10.1

Security fixes (MFSA 2024-20) (bsc#1222535):

- CVE-2024-3852: GetBoundName in the JIT returned the wrong object (bmo#1883542) 
- CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement (bmo#1884552) 
- CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection (bmo#1886683) 
- CVE-2024-2609: Permission prompt input delay could expire when not in focus (bmo#1866100) 
- CVE-2024-3859: Integer-overflow led to out-of-bounds-read in the OpenType sanitizer (bmo#1874489) 
- CVE-2024-3861: Potential use-after-free due to AlignedBuffer self-move (bmo#1883158) 
- CVE-2024-3863: Download Protections were bypassed by .xrm-ms files on Windows (bmo#1885855) 
- CVE-2024-3302: Denial of Service using HTTP/2 CONTINUATION frames (bmo#1881183, https://kb.cert.org/vuls/id/421644)
- CVE-2024-3864: Memory safety bug fixed in Firefox 125, Firefox ESR 115.10, and Thunderbird 115.10 (bmo#1888333)

Other Fixes:
  * fixed: Thunderbird processes did not exit cleanly; user
    intervention was required via task manager (bmo#1891889)
  * unresolved: After changing password on an IMAP account, the
    account could become locked due to too many failed login
    attempts (bmo#1862111)
  * fixed: Creating a tag in General Settings with a number as
    the tag name did not work (bmo#1881124)
  * fixed: Quick Filter button selections did not persist after
    restart (bmo#1847265)
  * fixed: Collapsing and expanding message list headers
    sometimes caused header to scroll out of view (bmo#1862197)
  * fixed: Single message with no children inside a parent thread
    sometimes displayed incorrectly as a thread with a duplicate
    of itself as its child (bmo#1427546)
  * fixed: 'Get selected messages' menu items did not work
    (bmo#1867091)
  * fixed: 'Download and Sync Messages' dialog was too short when
    using Russian locale, obscuring OK button (bmo#1881795)
  * fixed: After changing password on an IMAP account, the
    account could become locked due to too many failed login
    attempts (bmo#1862111)
  * fixed: Retrieving multiline POP3 message from server failed
    if message chunk ended in newline instead of carriage return
    and newline (bmo#1883760)
  * fixed: IMAP, POP3, and SMTP Exchange autoconfiguration did
    not support encryption configuration (bmo#1876992)
  * fixed: Non-empty address book search bar interfered with
    displaying/editing contacts (bmo#1833031)
  * fixed: Deleting attendees from 'Invite Attendees' view
    removed attendees from view, but not from invite
    (bmo#1874450)
  * fixed: Splitter arrow between task list and task description
    did not behave as expected (bmo#1889562)
  * fixed: Performance improvements and code cleanup
    (bmo#1878257,bmo#1883550)
  * fixed: Security fixes
  * unresolved: Thunderbird processes did not exit cleanly; user
    intervention was required via task manager (bmo#1891889)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2024-1437,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-1437,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1437,SUSE-SLE-Product-WE-15-SP5-2024-1437,openSUSE-SLE-15.5-2024-1437</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      <Description>Link for SUSE-SU-2024:1437-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2024-April/035096.html</URL>
      <Description>E-Mail link for SUSE-SU-2024:1437-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1222535</URL>
      <Description>SUSE Bug 1222535</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2609/</URL>
      <Description>SUSE CVE CVE-2024-2609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3302/</URL>
      <Description>SUSE CVE CVE-2024-3302 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3852/</URL>
      <Description>SUSE CVE CVE-2024-3852 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3854/</URL>
      <Description>SUSE CVE CVE-2024-3854 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3857/</URL>
      <Description>SUSE CVE CVE-2024-3857 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3859/</URL>
      <Description>SUSE CVE CVE-2024-3859 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3861/</URL>
      <Description>SUSE CVE CVE-2024-3861 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3863/</URL>
      <Description>SUSE CVE CVE-2024-3863 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-3864/</URL>
      <Description>SUSE CVE CVE-2024-3864 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Package Hub 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5" CPE="cpe:/o:suse:packagehub:15:sp5">SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 15 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 15 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP5" CPE="cpe:/o:suse:sle-we:15:sp5">SUSE Linux Enterprise Workstation Extension 15 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.5">
      <Branch Type="Product Name" Name="openSUSE Leap 15.5">
        <FullProductName ProductID="openSUSE Leap 15.5" CPE="cpe:/o:opensuse:leap:15.5">openSUSE Leap 15.5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-115.10.1-150200.8.157.1">
      <FullProductName ProductID="MozillaThunderbird-115.10.1-150200.8.157.1">MozillaThunderbird-115.10.1-150200.8.157.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1">MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1">MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1">MozillaThunderbird-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1">MozillaThunderbird-translations-common-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Package Hub 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1">MozillaThunderbird-translations-other-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Module for Package Hub 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1">MozillaThunderbird-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1">MozillaThunderbird-translations-common-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1">MozillaThunderbird-translations-other-115.10.1-150200.8.157.1 as a component of SUSE Linux Enterprise Workstation Extension 15 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1">MozillaThunderbird-115.10.1-150200.8.157.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1">MozillaThunderbird-translations-common-115.10.1-150200.8.157.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-115.10.1-150200.8.157.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.5">
      <FullProductName ProductID="openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1">MozillaThunderbird-translations-other-115.10.1-150200.8.157.1 as a component of openSUSE Leap 15.5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-2609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2609.html</URL>
        <Description>CVE-2024-2609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">There was no limit to the number of HTTP/2 CONTINUATION frames that would be processed. A server could abuse this to create an Out of Memory condition in the browser. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3302</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3302.html</URL>
        <Description>CVE-2024-3302</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">GetBoundName could return the wrong version of an object when JIT optimizations were applied. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3852</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3852.html</URL>
        <Description>CVE-2024-3852</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In some code patterns the JIT incorrectly optimized switch statements and generated code with out-of-bounds-reads. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3854</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3854.html</URL>
        <Description>CVE-2024-3854</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JIT created incorrect code for arguments in certain cases. This led to potential use-after-free crashes during garbage collection. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3857</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3857.html</URL>
        <Description>CVE-2024-3857</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On 32-bit versions there were integer-overflows that led to an out-of-bounds-read that potentially could be triggered by a malformed OpenType font. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3859</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3859.html</URL>
        <Description>CVE-2024-3859</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If an AlignedBuffer were assigned to itself, the subsequent self-move could result in an incorrect reference count and later use-after-free. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3861</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3861.html</URL>
        <Description>CVE-2024-3861</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The executable file warning was not presented when downloading .xrm-ms files.  
*Note: This issue only affected Windows operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3863</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3863.html</URL>
        <Description>CVE-2024-3863</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bug present in Firefox 124, Firefox ESR 115.9, and Thunderbird 115.9. This bug showed evidence of memory corruption and we presume that with enough effort this could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 125, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-3864</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Package Hub 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15 SP5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-common-115.10.1-150200.8.157.1</ProductID>
        <ProductID>openSUSE Leap 15.5:MozillaThunderbird-translations-other-115.10.1-150200.8.157.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2024/suse-su-20241437-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-3864.html</URL>
        <Description>CVE-2024-3864</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1222535</URL>
        <Description>SUSE Bug 1222535</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
