Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:11797 - Security Advisory
Issued:
2025-07-28
Updated:
2025-07-28

RHSA-2025:11797 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: firefox security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for firefox is now available for Red Hat Enterprise Linux 10.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: thunderbird: Large branch table could lead to truncated instruction (CVE-2025-8028)
  • firefox: thunderbird: Memory safety bugs (CVE-2025-8035)
  • firefox: thunderbird: Incorrect URL stripping in CSP reports (CVE-2025-8031)
  • firefox: thunderbird: JavaScript engine only wrote partial return value to stack (CVE-2025-8027)
  • firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command (CVE-2025-8030)
  • firefox: Memory safety bugs (CVE-2025-8034)
  • firefox: thunderbird: Incorrect JavaScript state machine for generators (CVE-2025-8033)
  • firefox: thunderbird: XSLT documents could bypass CSP (CVE-2025-8032)
  • firefox: thunderbird: javascript: URLs executed on object and embed tags (CVE-2025-8029)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 10 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 10 s390x
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0 s390x
  • Red Hat Enterprise Linux for Power, little endian 10 ppc64le
  • Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0 ppc64le
  • Red Hat Enterprise Linux for ARM 64 10 aarch64
  • Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0 aarch64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0 s390x
  • Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0 x86_64

Fixes

  • BZ - 2382701 - CVE-2025-8028 firefox: thunderbird: Large branch table could lead to truncated instruction
  • BZ - 2382703 - CVE-2025-8035 firefox: thunderbird: Memory safety bugs
  • BZ - 2382704 - CVE-2025-8031 firefox: thunderbird: Incorrect URL stripping in CSP reports
  • BZ - 2382707 - CVE-2025-8027 firefox: thunderbird: JavaScript engine only wrote partial return value to stack
  • BZ - 2382710 - CVE-2025-8030 firefox: thunderbird: Potential user-assisted code execution in ?Copy as cURL? command
  • BZ - 2382711 - CVE-2025-8034 firefox: Memory safety bugs
  • BZ - 2382717 - CVE-2025-8033 firefox: thunderbird: Incorrect JavaScript state machine for generators
  • BZ - 2382718 - CVE-2025-8032 firefox: thunderbird: XSLT documents could bypass CSP
  • BZ - 2382720 - CVE-2025-8029 firefox: thunderbird: javascript: URLs executed on object and embed tags

CVEs

  • CVE-2025-8027
  • CVE-2025-8028
  • CVE-2025-8029
  • CVE-2025-8030
  • CVE-2025-8031
  • CVE-2025-8032
  • CVE-2025-8033
  • CVE-2025-8034
  • CVE-2025-8035

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 10

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
x86_64
firefox-128.13.0-1.el10_0.x86_64.rpm SHA-256: 579a31e055cdcf54f337970f5ad80a14fa3926a7e67bc42d390f4fd731baa3b0
firefox-debuginfo-128.13.0-1.el10_0.x86_64.rpm SHA-256: 5bc7b9aebc8f1090b2b00990559439a7fd2cd189d372d00c504b125696e5f4e1
firefox-debugsource-128.13.0-1.el10_0.x86_64.rpm SHA-256: 679a9e7a61f17e2610fe7119735b8431771102109bea03deba9a88b0354e1cfd

Red Hat Enterprise Linux for x86_64 - Extended Update Support 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
x86_64
firefox-128.13.0-1.el10_0.x86_64.rpm SHA-256: 579a31e055cdcf54f337970f5ad80a14fa3926a7e67bc42d390f4fd731baa3b0
firefox-debuginfo-128.13.0-1.el10_0.x86_64.rpm SHA-256: 5bc7b9aebc8f1090b2b00990559439a7fd2cd189d372d00c504b125696e5f4e1
firefox-debugsource-128.13.0-1.el10_0.x86_64.rpm SHA-256: 679a9e7a61f17e2610fe7119735b8431771102109bea03deba9a88b0354e1cfd

Red Hat Enterprise Linux for IBM z Systems 10

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
s390x
firefox-128.13.0-1.el10_0.s390x.rpm SHA-256: 1e3e8303c74079df6e2753c86705ba0a909f7deb4d0011c3e3543625a045a282
firefox-debuginfo-128.13.0-1.el10_0.s390x.rpm SHA-256: a149e92899b76a877abdac08e78628ab77c15a0b38e42d540714957b1207af5c
firefox-debugsource-128.13.0-1.el10_0.s390x.rpm SHA-256: 5cd2bca3febedacb3f197eb01b7e13fdd0f2fe8cd08890e0d0c0f2acfc6152dc

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
s390x
firefox-128.13.0-1.el10_0.s390x.rpm SHA-256: 1e3e8303c74079df6e2753c86705ba0a909f7deb4d0011c3e3543625a045a282
firefox-debuginfo-128.13.0-1.el10_0.s390x.rpm SHA-256: a149e92899b76a877abdac08e78628ab77c15a0b38e42d540714957b1207af5c
firefox-debugsource-128.13.0-1.el10_0.s390x.rpm SHA-256: 5cd2bca3febedacb3f197eb01b7e13fdd0f2fe8cd08890e0d0c0f2acfc6152dc

Red Hat Enterprise Linux for Power, little endian 10

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
ppc64le
firefox-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 41a706015d419efe0f3993507385f178970a12d60529a900434b0e5fd8b5de2d
firefox-debuginfo-128.13.0-1.el10_0.ppc64le.rpm SHA-256: dd5e36db558448dc00780ea4784c0284ddb582a0871f570c4763c8352923e77c
firefox-debugsource-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 58a4d053a933577072570a3af9490091b7116b197fb6c452aa3b5563625c4cd2

Red Hat Enterprise Linux for Power, little endian - Extended Update Support 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
ppc64le
firefox-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 41a706015d419efe0f3993507385f178970a12d60529a900434b0e5fd8b5de2d
firefox-debuginfo-128.13.0-1.el10_0.ppc64le.rpm SHA-256: dd5e36db558448dc00780ea4784c0284ddb582a0871f570c4763c8352923e77c
firefox-debugsource-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 58a4d053a933577072570a3af9490091b7116b197fb6c452aa3b5563625c4cd2

Red Hat Enterprise Linux for ARM 64 10

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
aarch64
firefox-128.13.0-1.el10_0.aarch64.rpm SHA-256: ceca8b55978840e9d8f3a80434f25f8261015f375101fd4c67ef14d877b34e77
firefox-debuginfo-128.13.0-1.el10_0.aarch64.rpm SHA-256: 2e572d7b1ac97d1f05eff9d519d2538ee3d40ec302fae28909bfc5156b54e4cd
firefox-debugsource-128.13.0-1.el10_0.aarch64.rpm SHA-256: b9c18652f9d69854aa74426d8ae321bd59c064f6dd9c44612177c4454b57b91a

Red Hat Enterprise Linux for ARM 64 - Extended Update Support 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
aarch64
firefox-128.13.0-1.el10_0.aarch64.rpm SHA-256: ceca8b55978840e9d8f3a80434f25f8261015f375101fd4c67ef14d877b34e77
firefox-debuginfo-128.13.0-1.el10_0.aarch64.rpm SHA-256: 2e572d7b1ac97d1f05eff9d519d2538ee3d40ec302fae28909bfc5156b54e4cd
firefox-debugsource-128.13.0-1.el10_0.aarch64.rpm SHA-256: b9c18652f9d69854aa74426d8ae321bd59c064f6dd9c44612177c4454b57b91a

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
aarch64
firefox-128.13.0-1.el10_0.aarch64.rpm SHA-256: ceca8b55978840e9d8f3a80434f25f8261015f375101fd4c67ef14d877b34e77
firefox-debuginfo-128.13.0-1.el10_0.aarch64.rpm SHA-256: 2e572d7b1ac97d1f05eff9d519d2538ee3d40ec302fae28909bfc5156b54e4cd
firefox-debugsource-128.13.0-1.el10_0.aarch64.rpm SHA-256: b9c18652f9d69854aa74426d8ae321bd59c064f6dd9c44612177c4454b57b91a

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
s390x
firefox-128.13.0-1.el10_0.s390x.rpm SHA-256: 1e3e8303c74079df6e2753c86705ba0a909f7deb4d0011c3e3543625a045a282
firefox-debuginfo-128.13.0-1.el10_0.s390x.rpm SHA-256: a149e92899b76a877abdac08e78628ab77c15a0b38e42d540714957b1207af5c
firefox-debugsource-128.13.0-1.el10_0.s390x.rpm SHA-256: 5cd2bca3febedacb3f197eb01b7e13fdd0f2fe8cd08890e0d0c0f2acfc6152dc

Red Hat Enterprise Linux for Power, little endian - 4 years of support 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
ppc64le
firefox-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 41a706015d419efe0f3993507385f178970a12d60529a900434b0e5fd8b5de2d
firefox-debuginfo-128.13.0-1.el10_0.ppc64le.rpm SHA-256: dd5e36db558448dc00780ea4784c0284ddb582a0871f570c4763c8352923e77c
firefox-debugsource-128.13.0-1.el10_0.ppc64le.rpm SHA-256: 58a4d053a933577072570a3af9490091b7116b197fb6c452aa3b5563625c4cd2

Red Hat Enterprise Linux for x86_64 - 4 years of updates 10.0

SRPM
firefox-128.13.0-1.el10_0.src.rpm SHA-256: a5d4e49884abb2fe9429d455cb43e33551a91785ddf0ff05e6532bcc03ab8995
x86_64
firefox-128.13.0-1.el10_0.x86_64.rpm SHA-256: 579a31e055cdcf54f337970f5ad80a14fa3926a7e67bc42d390f4fd731baa3b0
firefox-debuginfo-128.13.0-1.el10_0.x86_64.rpm SHA-256: 5bc7b9aebc8f1090b2b00990559439a7fd2cd189d372d00c504b125696e5f4e1
firefox-debugsource-128.13.0-1.el10_0.x86_64.rpm SHA-256: 679a9e7a61f17e2610fe7119735b8431771102109bea03deba9a88b0354e1cfd

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility