Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:1184 - Security Advisory
Issued:
2025-02-10
Updated:
2025-02-10

RHSA-2025:1184 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: thunderbird security update

Type/Severity

Security Advisory: Important

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for thunderbird is now available for Red Hat Enterprise Linux 9.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mozilla Thunderbird is a standalone mail and newsgroup client.

Security Fix(es):

  • firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 (CVE-2025-1017)
  • firefox: thunderbird: Use-after-free in Custom Highlight (CVE-2025-1010)
  • firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 (CVE-2025-1016)
  • firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows (CVE-2025-1013)
  • firefox: thunderbird: A bug in WebAssembly code generation could result in a crash (CVE-2025-1011)
  • thunderbird: Unsanitized address book fields (CVE-2025-1015)
  • firefox: thunderbird: Use-after-free in XSLT (CVE-2025-1009)
  • thunderbird: Address of e-mail sender can be spoofed by malicious email (CVE-2025-0510)
  • firefox: thunderbird: Certificate length was not properly checked (CVE-2025-1014)
  • firefox: thunderbird: Use-after-free during concurrent delazification (CVE-2025-1012)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 9 x86_64
  • Red Hat Enterprise Linux for IBM z Systems 9 s390x
  • Red Hat Enterprise Linux for Power, little endian 9 ppc64le
  • Red Hat Enterprise Linux for ARM 64 9 aarch64

Fixes

  • BZ - 2343748 - CVE-2025-1017 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7
  • BZ - 2343750 - CVE-2025-1010 firefox: thunderbird: Use-after-free in Custom Highlight
  • BZ - 2343752 - CVE-2025-1016 firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7
  • BZ - 2343754 - CVE-2025-1013 firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows
  • BZ - 2343756 - CVE-2025-1011 firefox: thunderbird: A bug in WebAssembly code generation could result in a crash
  • BZ - 2343759 - CVE-2025-1015 thunderbird: Unsanitized address book fields
  • BZ - 2343760 - CVE-2025-1009 firefox: thunderbird: Use-after-free in XSLT
  • BZ - 2343762 - CVE-2025-0510 thunderbird: Address of e-mail sender can be spoofed by malicious email
  • BZ - 2343764 - CVE-2025-1014 firefox: thunderbird: Certificate length was not properly checked
  • BZ - 2343765 - CVE-2025-1012 firefox: thunderbird: Use-after-free during concurrent delazification

CVEs

  • CVE-2025-0510
  • CVE-2025-1009
  • CVE-2025-1010
  • CVE-2025-1011
  • CVE-2025-1012
  • CVE-2025-1013
  • CVE-2025-1014
  • CVE-2025-1015
  • CVE-2025-1016
  • CVE-2025-1017

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 9

SRPM
thunderbird-128.7.0-1.el9_5.src.rpm SHA-256: 6a9a867a024989fdfdc20306ce4328dde942b1790f0ad0ea4917c5487833b8c2
x86_64
thunderbird-128.7.0-1.el9_5.x86_64.rpm SHA-256: 8147978a0efb0e902b26e7faaf4b42ef3d273c56d3763614016bf71048b941e1
thunderbird-debuginfo-128.7.0-1.el9_5.x86_64.rpm SHA-256: 31f316bc758f2454e73e75647fcf84efce029b6fbacf366c0d298037b04ed4ad
thunderbird-debugsource-128.7.0-1.el9_5.x86_64.rpm SHA-256: fe540002ceb4acfc74a23dd9ca998dfff063a074962081a26053d2b8905f5fb7

Red Hat Enterprise Linux for IBM z Systems 9

SRPM
thunderbird-128.7.0-1.el9_5.src.rpm SHA-256: 6a9a867a024989fdfdc20306ce4328dde942b1790f0ad0ea4917c5487833b8c2
s390x
thunderbird-128.7.0-1.el9_5.s390x.rpm SHA-256: 1d5d9357673817c57f1467460be760207f5c6a007fc89312f17187ec55ecfee2
thunderbird-debuginfo-128.7.0-1.el9_5.s390x.rpm SHA-256: 828dd57795f13535d0573d7b58420e208eea9d8dd5a482e6f0ea1e19f6c47130
thunderbird-debugsource-128.7.0-1.el9_5.s390x.rpm SHA-256: 0e72edab26452896f996b088731fb28c2bc8520ebbe3a71901183f2b042911b3

Red Hat Enterprise Linux for Power, little endian 9

SRPM
thunderbird-128.7.0-1.el9_5.src.rpm SHA-256: 6a9a867a024989fdfdc20306ce4328dde942b1790f0ad0ea4917c5487833b8c2
ppc64le
thunderbird-128.7.0-1.el9_5.ppc64le.rpm SHA-256: 03220ffaa8987826d81151fdd22ea02444d603bd7620d77b15b3f2e711fe49f3
thunderbird-debuginfo-128.7.0-1.el9_5.ppc64le.rpm SHA-256: 9e48ce378b5699cc1b15054bcb49ff84baba3796df5bcb680da21a45e8584103
thunderbird-debugsource-128.7.0-1.el9_5.ppc64le.rpm SHA-256: 943fb7463bba10e5e5f53617910e191b1a8858258200b35436db15c42867c2d6

Red Hat Enterprise Linux for ARM 64 9

SRPM
thunderbird-128.7.0-1.el9_5.src.rpm SHA-256: 6a9a867a024989fdfdc20306ce4328dde942b1790f0ad0ea4917c5487833b8c2
aarch64
thunderbird-128.7.0-1.el9_5.aarch64.rpm SHA-256: c77c96bb2a94764f32d5ba17de25fc93fc4878a90bbec0442510a2ce47d5c98a
thunderbird-debuginfo-128.7.0-1.el9_5.aarch64.rpm SHA-256: f3e64a81bc39fd82e7196315ba1064b3914e69f21d8c9ef86fe4712cf111fd67
thunderbird-debugsource-128.7.0-1.el9_5.aarch64.rpm SHA-256: 1a9acba4c7f7e4bc37c856f29d5fd6b77fbe3536161672cd92cce56861290f26

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat X (formerly Twitter)

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat, Inc.

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility