{"id":"ALSA-2025:8756","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.  \n\nSecurity Fix(es):  \n\n  * thunderbird: JavaScript Execution via Spoofed PDF Attachment and file:/// Link (CVE-2025-3909)\n  * thunderbird: Sender Spoofing via Malformed From Header in Thunderbird (CVE-2025-3875)\n  * thunderbird: Unsolicited File Download, Disk Space Exhaustion, and Credential Leakage via mailbox:/// Links (CVE-2025-3877)\n  * thunderbird: Tracking Links in Attachments Bypassed Remote Content Blocking (CVE-2025-3932)\n  * firefox: thunderbird: Out-of-bounds access when resolving Promise objects (CVE-2025-4918)\n  * firefox: thunderbird: Out-of-bounds access when optimizing linear sums (CVE-2025-4919)\n  * firefox: thunderbird: Clickjacking vulnerability could have led to leaking saved payment card details (CVE-2025-5267)\n  * firefox: thunderbird: Potential local code execution in ?Copy as cURL? command (CVE-2025-5264)\n  * firefox: thunderbird: Memory safety bugs (CVE-2025-5268)\n  * firefox: thunderbird: Script element events leaked cross-origin resource status (CVE-2025-5266)\n  * firefox: thunderbird: Error handling for script execution was incorrectly isolated from web content (CVE-2025-5263)\n  * firefox: thunderbird: Memory safety bug (CVE-2025-5269)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-02-04T04:34:49.220393Z","published":"2025-06-10T00:00:00Z","related":["CVE-2025-3875","CVE-2025-3877","CVE-2025-3909","CVE-2025-3932","CVE-2025-4918","CVE-2025-4919","CVE-2025-5263","CVE-2025-5264","CVE-2025-5266","CVE-2025-5267","CVE-2025-5268","CVE-2025-5269"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:8756"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-3875"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-3877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-3909"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-3932"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-4918"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-4919"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5263"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5264"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5266"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5267"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5268"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-5269"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2366283"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2366287"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2366291"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2366297"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2367016"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2367018"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368751"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368755"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2368757"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2025-8756.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.11.0-1.el8_10.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2025:8756.json"}}],"schema_version":"1.7.3"}