File _patchinfo of Package patchinfo.39900
<patchinfo incident="39900"> <issue tracker="bnc" id="1246664">VUL-0: MozillaFirefox / MozillaThunderbird: update to 141.0 and 140.1esr</issue> <issue tracker="bnc" id="1244670">VUL-0: MozillaFirefox / MozillaThunderbird: update to 140.0 and 128.12esr</issue> <issue tracker="cve" id="2025-6432"/> <issue tracker="cve" id="2025-8040"/> <issue tracker="cve" id="2025-6430"/> <issue tracker="cve" id="2025-6429"/> <issue tracker="cve" id="2025-6434"/> <issue tracker="cve" id="2025-8035"/> <issue tracker="cve" id="2025-6426"/> <issue tracker="cve" id="2025-8032"/> <issue tracker="cve" id="2025-8038"/> <issue tracker="cve" id="2025-8033"/> <issue tracker="cve" id="2025-8036"/> <issue tracker="cve" id="2025-6435"/> <issue tracker="cve" id="2025-8039"/> <issue tracker="cve" id="2025-6424"/> <issue tracker="cve" id="2025-8030"/> <issue tracker="cve" id="2025-6427"/> <issue tracker="cve" id="2025-8034"/> <issue tracker="cve" id="2025-8031"/> <issue tracker="cve" id="2025-6436"/> <issue tracker="cve" id="2025-8027"/> <issue tracker="cve" id="2025-6425"/> <issue tracker="cve" id="2025-8028"/> <issue tracker="cve" id="2025-8037"/> <issue tracker="cve" id="2025-8029"/> <issue tracker="cve" id="2025-6433"/> <packager>MSirringhaus</packager> <rating>important</rating> <category>security</category> <summary>Security update for MozillaThunderbird</summary> <description>This update for MozillaThunderbird fixes the following issues: Update to Mozilla Thunderbird 140.1 (MFSA 2025-63) (bsc#1246664): - CVE-2025-8027: JavaScript engine only wrote partial return value to stack (bmo#1968423) - CVE-2025-8028: Large branch table could lead to truncated instruction (bmo#1971581) - CVE-2025-8029: javascript: URLs executed on object and embed tags (bmo#1928021) - CVE-2025-8036: DNS rebinding circumvents CORS (bmo#1960834) - CVE-2025-8037: Nameless cookies shadow secure cookies (bmo#1964767) - CVE-2025-8030: Potential user-assisted code execution in "Copy as cURL" command (bmo#1968414) - CVE-2025-8031: Incorrect URL stripping in CSP reports (bmo#1971719) - CVE-2025-8032: XSLT documents could bypass CSP (bmo#1974407) - CVE-2025-8038: CSP frame-src was not correctly enforced for paths (bmo#1808979) - CVE-2025-8039: Search terms persisted in URL bar (bmo#1970997) - CVE-2025-8033: Incorrect JavaScript state machine for generators (bmo#1973990) - CVE-2025-8034: Memory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1970422, bmo#1970422, bmo#1970422, bmo#1970422) - CVE-2025-8040: Memory safety bugs fixed in Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1975058, bmo#1975058, bmo#1975998, bmo#1975998) - CVE-2025-8035: Memory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141 (bmo#1975961, bmo#1975961, bmo#1975961) Update to Mozilla Thunderbird 140.0.1 (MFSA 2025-54) (bsc#1244670): - CVE-2025-6424: Use-after-free in FontFaceSet (bmo#1966423) - CVE-2025-6425: The WebCompat WebExtension shipped exposed a persistent UUID (bmo#1717672) - CVE-2025-6426: No warning when opening executable terminal files on macOS (bmo#1964385) - CVE-2025-6427: connect-src Content Security Policy restriction could be bypassed (bmo#1966927) - CVE-2025-6429: Incorrect parsing of URLs could have allowed embedding of youtube.com (bmo#1970658) - CVE-2025-6430: Content-Disposition header ignored when a file is included in an embed or object tag (bmo#1971140) - CVE-2025-6432: DNS Requests leaked outside of a configured SOCKS proxy (bmo#1943804) - CVE-2025-6433: WebAuthn would allow a user to sign a challenge on a webpage with an invalid TLS certificate (bmo#1954033) - CVE-2025-6434: HTTPS-Only exception screen lacked anti-clickjacking delay (bmo#1955182) - CVE-2025-6435: Save as in Devtools could download files without sanitizing the extension (bmo#1950056, bmo#1961777) - CVE-2025-6436: Memory safety bugs fixed in Firefox 140 and Thunderbird 140 (bmo#1941377, bmo#1960948, bmo#1966187, bmo#1966505, bmo#1970764) </description> </patchinfo>