<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
	<DocumentTitle xml:lang="en">An update for thunderbird is now available for openEuler-24.03-LTS-SP2</DocumentTitle>
	<DocumentType>Security Advisory</DocumentType>
	<DocumentPublisher Type="Vendor">
		<ContactDetails>openeuler-security@openeuler.org</ContactDetails>
		<IssuingAuthority>openEuler security committee</IssuingAuthority>
	</DocumentPublisher>
	<DocumentTracking>
		<Identification>
			<ID>openEuler-SA-2025-2099</ID>
		</Identification>
		<Status>Final</Status>
		<Version>1.0</Version>
		<RevisionHistory>
			<Revision>
				<Number>1.0</Number>
				<Date>2025-09-05</Date>
				<Description>Initial</Description>
			</Revision>
		</RevisionHistory>
		<InitialReleaseDate>2025-09-05</InitialReleaseDate>
		<CurrentReleaseDate>2025-09-05</CurrentReleaseDate>
		<Generator>
			<Engine>openEuler SA Tool V1.0</Engine>
			<Date>2025-09-05</Date>
		</Generator>
	</DocumentTracking>
	<DocumentNotes>
		<Note Title="Synopsis" Type="General" Ordinal="1" xml:lang="en">thunderbird security update</Note>
		<Note Title="Summary" Type="General" Ordinal="2" xml:lang="en">An update for thunderbird is now available for openEuler-24.03-LTS-SP2</Note>
		<Note Title="Description" Type="General" Ordinal="3" xml:lang="en">Security Fix(es):

On 64-bit platforms, IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack, while Baseline-JIT read the entire 64 bits. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8027)

On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8028)

Firefox executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8029)

Insufficient escaping in the &apos;Copy as cURL&apos; feature in Firefox and Thunderbird could potentially be exploited to trick a user into executing unexpected code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8030)

The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8031)

XSLT document loading did not correctly propagate the source document which bypassed its Content Security Policy (CSP). This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8032)

The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr dereference. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8033)

Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8034)

Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.(CVE-2025-8035)

A vulnerability was found in Mozilla Thunderbird up to 141 (Mail Client Software). It has been rated as critical.Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 142 eliminates this vulnerability.(CVE-2025-9179)

A same-origin policy bypass vulnerability exists in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.(CVE-2025-9180)

Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.(CVE-2025-9181)

Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.(CVE-2025-9185)</Note>
		<Note Title="Topic" Type="General" Ordinal="4" xml:lang="en">An update for thunderbird is now available for openEuler-24.03-LTS-SP2.

openEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.</Note>
		<Note Title="Severity" Type="General" Ordinal="5" xml:lang="en">Critical</Note>
		<Note Title="Affected Component" Type="General" Ordinal="6" xml:lang="en">thunderbird</Note>
	</DocumentNotes>
	<DocumentReferences>
		<Reference Type="Self">
			<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
		</Reference>
		<Reference Type="openEuler CVE">
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8027</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8028</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8029</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8030</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8031</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8032</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8033</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8034</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-8035</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-9179</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-9180</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-9181</URL>
			<URL>https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2025-9185</URL>
		</Reference>
		<Reference Type="Other">
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8027</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8028</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8029</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8030</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8031</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8032</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8033</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8034</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-8035</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-9179</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-9180</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-9181</URL>
			<URL>https://nvd.nist.gov/vuln/detail/CVE-2025-9185</URL>
		</Reference>
	</DocumentReferences>
	<ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
		<Branch Type="Product Name" Name="openEuler">
			<FullProductName ProductID="openEuler-24.03-LTS-SP2" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2">openEuler-24.03-LTS-SP2</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="aarch64">
			<FullProductName ProductID="thunderbird-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-128.14.0-1.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-debuginfo-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-debuginfo-128.14.0-1.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-debugsource-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-debugsource-128.14.0-1.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-librnp-rnp-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-librnp-rnp-128.14.0-1.oe2403sp2.aarch64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-wayland-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-wayland-128.14.0-1.oe2403sp2.aarch64.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="src">
			<FullProductName ProductID="thunderbird-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-128.14.0-1.oe2403sp2.src.rpm</FullProductName>
		</Branch>
		<Branch Type="Package Arch" Name="x86_64">
			<FullProductName ProductID="thunderbird-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-128.14.0-1.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-debuginfo-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-debuginfo-128.14.0-1.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-debugsource-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-debugsource-128.14.0-1.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-librnp-rnp-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-librnp-rnp-128.14.0-1.oe2403sp2.x86_64.rpm</FullProductName>
			<FullProductName ProductID="thunderbird-wayland-128.14.0-1" CPE="cpe:/a:openEuler:openEuler:24.03-LTS-SP2" EPOL="true">thunderbird-wayland-128.14.0-1.oe2403sp2.x86_64.rpm</FullProductName>
		</Branch>
	</ProductTree>
	<Vulnerability Ordinal="1" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On 64-bit platforms, IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack, while Baseline-JIT read the entire 64 bits. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8027</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="2" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">On arm64, a WASM `br_table` instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8028</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="3" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox executed `javascript:` URLs when used in `object` and `embed` tags. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8029</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="4" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Insufficient escaping in the &apos;Copy as cURL&apos; feature in Firefox and Thunderbird could potentially be exploited to trick a user into executing unexpected code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8030</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="5" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The `username:password` part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8031</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="6" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">XSLT document loading did not correctly propagate the source document which bypassed its Content Security Policy (CSP). This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8032</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="7" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr dereference. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8033</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="8" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 115.26, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8034</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="9" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 141, Firefox ESR &lt; 128.13, Firefox ESR &lt; 140.1, Thunderbird &lt; 141, Thunderbird &lt; 128.13, and Thunderbird &lt; 140.1.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-8035</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="10" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in Mozilla Thunderbird up to 141 (Mail Client Software). It has been rated as critical.Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 142 eliminates this vulnerability.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-9179</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Critical</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>9.8</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="11" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy bypass vulnerability exists in the Graphics: Canvas2D component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-9180</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="12" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-9181</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>Medium</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>6.5</BaseScore>
				<Vector>AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
	<Vulnerability Ordinal="13" xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1">
		<Notes>
			<Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 142, Firefox ESR &lt; 115.27, Firefox ESR &lt; 128.14, Firefox ESR &lt; 140.2, Thunderbird &lt; 142, Thunderbird &lt; 128.14, and Thunderbird &lt; 140.2.</Note>
		</Notes>
		<ReleaseDate>2025-09-05</ReleaseDate>
		<CVE>CVE-2025-9185</CVE>
		<ProductStatuses>
			<Status Type="Fixed">
				<ProductID>openEuler-24.03-LTS-SP2</ProductID>
			</Status>
		</ProductStatuses>
		<Threats>
			<Threat Type="Impact">
				<Description>High</Description>
			</Threat>
		</Threats>
		<CVSSScoreSets>
			<ScoreSet>
				<BaseScore>8.1</BaseScore>
				<Vector>AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H</Vector>
			</ScoreSet>
		</CVSSScoreSets>
		<Remediations>
			<Remediation Type="Vendor Fix">
				<Description>thunderbird security update</Description>
				<DATE>2025-09-05</DATE>
				<URL>https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-2099</URL>
			</Remediation>
		</Remediations>
	</Vulnerability>
</cvrfdoc>