OESA-2025-2099

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2025-2099
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2025-2099.json
JSON Data
https://api.test.osv.dev/v1/vulns/OESA-2025-2099
Upstream
Published
2025-09-05T12:39:43Z
Modified
2025-09-05T13:03:49.278082Z
Summary
thunderbird security update
Details

Security Fix(es):

On 64-bit platforms, IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack, while Baseline-JIT read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8027)

On arm64, a WASM br_table instruction with a lot of entries could lead to the label being too far from the instruction causing truncation and incorrect computation of the branch address. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8028)

Firefox executed javascript: URLs when used in object and embed tags. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8029)

Insufficient escaping in the 'Copy as cURL' feature in Firefox and Thunderbird could potentially be exploited to trick a user into executing unexpected code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8030)

The username:password part was not correctly stripped from URLs in CSP reports potentially leaking HTTP Basic Authentication credentials. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8031)

XSLT document loading did not correctly propagate the source document which bypassed its Content Security Policy (CSP). This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8032)

The JavaScript engine did not handle closed generators correctly and it was possible to resume them leading to a nullptr dereference. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8033)

Memory safety bugs present in Firefox ESR 115.25, Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8034)

Memory safety bugs present in Firefox ESR 128.12, Thunderbird ESR 128.12, Firefox ESR 140.0, Thunderbird ESR 140.0, Firefox 140 and Thunderbird 140. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 141, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.(CVE-2025-8035)

A vulnerability was found in Mozilla Thunderbird up to 141 (Mail Client Software). It has been rated as critical.Using CWE to declare the problem leads to CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Impacted is confidentiality, integrity, and availability.Upgrading to version 142 eliminates this vulnerability.(CVE-2025-9179)

A same-origin policy bypass vulnerability exists in the Graphics: Canvas2D component. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9180)

Uninitialized memory in the JavaScript Engine component. This vulnerability affects Firefox < 142, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9181)

Memory safety bugs present in Firefox ESR 115.26, Firefox ESR 128.13, Thunderbird ESR 128.13, Firefox ESR 140.1, Thunderbird ESR 140.1, Firefox 141 and Thunderbird 141. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 142, Firefox ESR < 115.27, Firefox ESR < 128.14, Firefox ESR < 140.2, Thunderbird < 142, Thunderbird < 128.14, and Thunderbird < 140.2.(CVE-2025-9185)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP2 / thunderbird

Package

Name
thunderbird
Purl
pkg:rpm/openEuler/thunderbird&distro=openEuler-24.03-LTS-SP2

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
128.14.0-1.oe2403sp2

Ecosystem specific

{
    "src": [
        "thunderbird-128.14.0-1.oe2403sp2.src.rpm"
    ],
    "aarch64": [
        "thunderbird-128.14.0-1.oe2403sp2.aarch64.rpm",
        "thunderbird-debuginfo-128.14.0-1.oe2403sp2.aarch64.rpm",
        "thunderbird-debugsource-128.14.0-1.oe2403sp2.aarch64.rpm",
        "thunderbird-librnp-rnp-128.14.0-1.oe2403sp2.aarch64.rpm",
        "thunderbird-wayland-128.14.0-1.oe2403sp2.aarch64.rpm"
    ],
    "x86_64": [
        "thunderbird-128.14.0-1.oe2403sp2.x86_64.rpm",
        "thunderbird-debuginfo-128.14.0-1.oe2403sp2.x86_64.rpm",
        "thunderbird-debugsource-128.14.0-1.oe2403sp2.x86_64.rpm",
        "thunderbird-librnp-rnp-128.14.0-1.oe2403sp2.x86_64.rpm",
        "thunderbird-wayland-128.14.0-1.oe2403sp2.x86_64.rpm"
    ]
}