{"id":"MGASA-2025-0228","summary":"Updated thunderbird packages fix vulnerabilities","details":"Use-after-free in FontFaceSet. (CVE-2025-6424)\nThe WebCompat WebExtension shipped exposed a persistent UUID.\n(CVE-2025-6425)\nIncorrect parsing of URLs could have allowed embedding of youtube.com.\n(CVE-2025-6429)\nContent-Disposition header ignored when a file is included in an embed\nor object tag. (CVE-2025-6430)\nJavaScript engine only wrote partial return value to stack.\n(CVE-2025-8027)\nLarge branch table could lead to truncated instruction. (CVE-2025-8028)\nJavascript: URLs executed on object and embed tags. (CVE-2025-8029)\nPotential user-assisted code execution in “Copy as cURL” command.\n(CVE-2025-8030)\nIncorrect URL stripping in CSP reports. (CVE-2025-8031)\nXSLT documents could bypass CSP. (CVE-2025-8032)\nIncorrect JavaScript state machine for generators. (CVE-2025-8033)\nMemory safety bugs fixed in Firefox ESR 115.26, Firefox ESR 128.13,\nThunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1,\nFirefox 141 and Thunderbird 141. (CVE-2025-8034)\nMemory safety bugs fixed in Firefox ESR 128.13, Thunderbird ESR 128.13,\nFirefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird\n141. (CVE-2025-8035)\nSandbox escape due to invalid pointer in the Audio/Video: GMP component.\n(CVE-2025-9179)\nSame-origin policy bypass in the Graphics: Canvas2D component.\n(CVE-2025-9180)\nUninitialized memory in the JavaScript Engine component. (CVE-2025-9181)\nMemory safety bugs fixed in Firefox ESR 115.27, Firefox ESR 128.14,\nThunderbird ESR 128.14, Firefox ESR 140.2, Thunderbird ESR 140.2,\nFirefox 142 and Thunderbird 142. (CVE-2025-9185).\nFor the armv7hl architecture this package fixes additional vulnerabilities;\nsee the links below:\nhttps://advisories.mageia.org/MGASA-2025-0197.html\nhttps://advisories.mageia.org/MGASA-2025-0168.html\nhttps://advisories.mageia.org/MGASA-2025-0151.html\nhttps://advisories.mageia.org/MGASA-2025-0126.html\nhttps://advisories.mageia.org/MGASA-2025-0093.html\nhttps://advisories.mageia.org/MGASA-2025-0048.html\nhttps://advisories.mageia.org/MGASA-2025-0010.html\nhttps://advisories.mageia.org/MGASA-2024-0395.html\nhttps://advisories.mageia.org/MGASA-2024-0384.html\nhttps://advisories.mageia.org/MGASA-2024-0365.html\nhttps://advisories.mageia.org/MGASA-2024-0350.html\nhttps://advisories.mageia.org/MGASA-2024-0336.html\nhttps://advisories.mageia.org/MGASA-2024-0332.html\n","modified":"2026-03-25T17:59:10.864347Z","published":"2025-09-05T18:30:35Z","related":["CVE-2025-6424","CVE-2025-6425","CVE-2025-6429","CVE-2025-6430","CVE-2025-8027","CVE-2025-8028","CVE-2025-8029","CVE-2025-8030","CVE-2025-8031","CVE-2025-8032","CVE-2025-8033","CVE-2025-8034","CVE-2025-8035","CVE-2025-9179","CVE-2025-9180","CVE-2025-9181","CVE-2025-9185"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2025-0228.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=34415"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/128.12.0esr/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-55/"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/128.13.0esr/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-62/"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/128.14.0esr/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-71/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.14.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0228.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.14.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0228.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}