Security Fix(es):
A use-after-free in FontFaceSet resulted in a potentially exploitable crash. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.(CVE-2025-6424)
An attacker who enumerated resources from the WebCompat extension could have obtained a persistent UUID that identified the browser, and persisted between containers and normal/private browsing mode, but not profiles. This vulnerability affects Firefox < 140, Firefox ESR < 115.25, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.(CVE-2025-6425)
Firefox could have incorrectly parsed a URL and rewritten it to the youtube.com domain when parsing the URL specified in an embed
tag. This could have bypassed website security checks that restricted which domains users were allowed to embed. This vulnerability affects Firefox < 140, Firefox ESR < 128.12, Thunderbird < 140, and Thunderbird < 128.12.(CVE-2025-6429)
When a file download is specified via the Content-Disposition
header, that directive would be ignored if the file was included via a &lt;embed&gt;
or &lt;object&gt;
tag, potentially making a website vulnerable to a cross-site scripting attack. This vulnerability affects Firefox < 140 and Firefox ESR < 128.12.(CVE-2025-6430)
{ "severity": "Critical" }
{ "src": [ "thunderbird-128.12.0-1.oe2403sp2.src.rpm" ], "x86_64": [ "thunderbird-128.12.0-1.oe2403sp2.x86_64.rpm", "thunderbird-debuginfo-128.12.0-1.oe2403sp2.x86_64.rpm", "thunderbird-debugsource-128.12.0-1.oe2403sp2.x86_64.rpm", "thunderbird-librnp-rnp-128.12.0-1.oe2403sp2.x86_64.rpm", "thunderbird-wayland-128.12.0-1.oe2403sp2.x86_64.rpm" ], "aarch64": [ "thunderbird-128.12.0-1.oe2403sp2.aarch64.rpm", "thunderbird-debuginfo-128.12.0-1.oe2403sp2.aarch64.rpm", "thunderbird-debugsource-128.12.0-1.oe2403sp2.aarch64.rpm", "thunderbird-librnp-rnp-128.12.0-1.oe2403sp2.aarch64.rpm", "thunderbird-wayland-128.12.0-1.oe2403sp2.aarch64.rpm" ] }