{"id":"MGASA-2025-0151","summary":"Updated thunderbird packages fix security vulnerabilities","details":"Process isolation bypass using \"javascript:\" URI links in cross-origin\nframes. (CVE-2025-4083)\nUnsafe attribute access during XPath parsing. (CVE-2025-4087)\nMemory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR\n128.10, and Thunderbird 128.10. (CVE-2025-4091)\nMemory safety bug fixed in Firefox ESR 128.10 and Thunderbird 128.10.\n(CVE-2025-4093)\n","modified":"2026-02-04T03:29:28.924303Z","published":"2025-05-08T18:51:21Z","related":["CVE-2025-4083","CVE-2025-4087","CVE-2025-4091","CVE-2025-4093"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2025-0151.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=34233"},{"type":"REPORT","url":"https://www.thunderbird.net/en-US/thunderbird/128.10.0esr/releasenotes/"},{"type":"REPORT","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2025-32/"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.10.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0151.json"}},{"package":{"name":"thunderbird-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/thunderbird-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.10.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2025-0151.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}