File _patchinfo of Package patchinfo.41944
<patchinfo incident="41944">
<issue tracker="bnc" id="1254551">VUL-0: MozillaFirefox / MozillaThunderbird: update to 146.0 and 140.6esr</issue>
<issue tracker="cve" id="2025-14321"/>
<issue tracker="cve" id="2025-14322"/>
<issue tracker="cve" id="2025-14323"/>
<issue tracker="cve" id="2025-14324"/>
<issue tracker="cve" id="2025-14325"/>
<issue tracker="cve" id="2025-14328"/>
<issue tracker="cve" id="2025-14329"/>
<issue tracker="cve" id="2025-14330"/>
<issue tracker="cve" id="2025-14331"/>
<issue tracker="cve" id="2025-14333"/>
<packager>MSirringhaus</packager>
<rating>important</rating>
<category>security</category>
<summary>Security update for MozillaThunderbird</summary>
<description>This update for MozillaThunderbird fixes the following issues:
Update to Mozilla Thunderbird 140.6 (bsc#1254551).
- MFSA 2025-96
* CVE-2025-14321: use-after-free in the WebRTC: Signaling component.
* CVE-2025-14322: sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component.
* CVE-2025-14323: privilege escalation in the DOM: Notifications component.
* CVE-2025-14324: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14325: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14328: privilege escalation in the Netmonitor component.
* CVE-2025-14329: privilege escalation in the Netmonitor component.
* CVE-2025-14330: JIT miscompilation in the JavaScript Engine: JIT component.
* CVE-2025-14331: same-origin policy bypass in the Request Handling component.
* CVE-2025-14333: memory safety bugs.
</description>
</patchinfo>