File _patchinfo of Package patchinfo.38562
<patchinfo incident="38562"> <issue tracker="bnc" id="1241621">VUL-0: MozillaFirefox / MozillaThunderbird: update to 138.0 and 128.10esr</issue> <issue tracker="cve" id="2025-4082"/> <issue tracker="cve" id="2025-4087"/> <issue tracker="cve" id="2025-4093"/> <issue tracker="cve" id="2025-4091"/> <issue tracker="cve" id="2025-4083"/> <issue tracker="cve" id="2025-4084"/> <issue tracker="cve" id="2025-2817"/> <packager>MSirringhaus</packager> <rating>important</rating> <category>security</category> <summary>Security update for MozillaThunderbird</summary> <description>This update for MozillaThunderbird fixes the following issues: Mozilla Thunderbird ESR 128.10 update (bsc#1241621): - CVE-2025-4082: WebGL shader attribute memory corruption in Thunderbird for macOS. - CVE-2025-4087: Unsafe attribute access during XPath parsing. - CVE-2025-4093: Memory safety bug fixed in Firefox ESR 128.10 and Thunderbird. - CVE-2025-4091: Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10. - CVE-2025-4083: Process isolation bypass using "javascript:" URI links in cross-origin frames. - CVE-2025-4084: Potential local code execution in "copy as cURL" command. - CVE-2025-2817: Privilege escalation in Thunderbird Updater. </description> </patchinfo>