Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2025:20026-1

Опубликовано: 07 нояб. 2025
Источник: suse-cvrf

Описание

Security update for MozillaThunderbird

This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird 140.4:

  • changed: Account Hub is now disabled by default for second email account
  • changed: Flatpak runtime has been updated to Freedesktop SDK 24.08
  • fixed: Users could not read mail signed with OpenPGP v6 and PQC keys
  • fixed: Image preview in Insert Image dialog failed with CSP error for web resources
  • fixed: Emptying trash on exit did not work with some providers
  • fixed: Thunderbird could crash when applying filters
  • fixed: Users were unable to override expired mail server certificate
  • fixed: Opening Website header link in RSS feed incorrectly re-encoded URL parameters
  • fixed: Security fixes

MFSA 2025-85 (bsc#1251263):

  • CVE-2025-11708 Use-after-free in MediaTrackGraphImpl::GetInstance()
  • CVE-2025-11709 Out of bounds read/write in a privileged process triggered by WebGL textures
  • CVE-2025-11710 Cross-process information leaked due to malicious IPC messages
  • CVE-2025-11711 Some non-writable Object properties could be modified
  • CVE-2025-11712 An OBJECT tag type attribute overrode browser behavior on web resources without a content-type
  • CVE-2025-11713 Potential user-assisted code execution in “Copy as cURL” command
  • CVE-2025-11714 Memory safety bugs fixed in Firefox ESR 115.29, Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144
  • CVE-2025-11715 Memory safety bugs fixed in Firefox ESR 140.4, Thunderbird ESR 140.4, Firefox 144 and Thunderbird 144

Список пакетов

openSUSE Leap 16.0
MozillaThunderbird-140.4.0-bp160.1.1
MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
MozillaThunderbird-translations-common-140.4.0-bp160.1.1
MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Описание

Use-after-free in MediaTrackGraphImpl::GetInstance() This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

A compromised web process was able to trigger out of bounds reads and writes in a more privileged process using manipulated WebGL textures. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

A compromised web process using malicious IPC messages could have caused the privileged browser process to reveal blocks of its memory to the compromised process. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

There was a way to change the value of JavaScript Object properties that were supposed to be non-writeable. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

A malicious page could have used the type attribute of an OBJECT tag to override the default browser behavior when encountering a web resource served without a content-type. This could have contributed to an XSS on a site that unsafely serves files without a content-type header. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

Insufficient escaping in the "Copy as cURL" feature could have been used to trick a user into executing unexpected code on Windows. This did not affect the application when running on other operating systems. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

Memory safety bugs present in Firefox ESR 115.28, Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 115.29, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки

Описание

Memory safety bugs present in Firefox ESR 140.3, Thunderbird ESR 140.3, Firefox 143 and Thunderbird 143. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 144, Firefox ESR < 140.4, Thunderbird < 144, and Thunderbird < 140.4.


Затронутые продукты
openSUSE Leap 16.0:MozillaThunderbird-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.4.0-bp160.1.1
openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.4.0-bp160.1.1

Ссылки
Уязвимость openSUSE-SU-2025:20026-1