Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2025:22373 - Security Advisory
Issued:
2025-12-01
Updated:
2025-12-01

RHSA-2025:22373 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Important: firefox security update

Type/Severity

Security Advisory: Important

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An update for firefox is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.

Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.

Description

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: Mitigation bypass in the DOM: Security component (CVE-2025-13018)
  • firefox: Use-after-free in the Audio/Video component (CVE-2025-13014)
  • firefox: Incorrect boundary conditions in the JavaScript: WebAssembly component (CVE-2025-13016)
  • firefox: Same-origin policy bypass in the DOM: Workers component (CVE-2025-13019)
  • firefox: Use-after-free in the WebRTC: Audio/Video component (CVE-2025-13020)
  • firefox: Race condition in the Graphics component (CVE-2025-13012)
  • firefox: Spoofing issue in Firefox (CVE-2025-13015)
  • firefox: Mitigation bypass in the DOM: Core & HTML component (CVE-2025-13013)
  • firefox: Same-origin policy bypass in the DOM: Notifications component (CVE-2025-13017)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0 ppc64le
  • Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0 x86_64
  • Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0 aarch64
  • Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0 s390x

Fixes

  • BZ - 2414079 - CVE-2025-13018 firefox: thunderbird: Mitigation bypass in the DOM: Security component
  • BZ - 2414080 - CVE-2025-13014 firefox: thunderbird: Use-after-free in the Audio/Video component
  • BZ - 2414083 - CVE-2025-13016 firefox: thunderbird: Incorrect boundary conditions in the JavaScript: WebAssembly component
  • BZ - 2414084 - CVE-2025-13019 firefox: thunderbird: Same-origin policy bypass in the DOM: Workers component
  • BZ - 2414085 - CVE-2025-13020 firefox: thunderbird: Use-after-free in the WebRTC: Audio/Video component
  • BZ - 2414086 - CVE-2025-13012 firefox: thunderbird: Race condition in the Graphics component
  • BZ - 2414090 - CVE-2025-13015 firefox: thunderbird: Spoofing issue in Firefox
  • BZ - 2414091 - CVE-2025-13013 firefox: thunderbird: Mitigation bypass in the DOM: Core & HTML component
  • BZ - 2414092 - CVE-2025-13017 firefox: thunderbird: Same-origin policy bypass in the DOM: Notifications component

CVEs

  • CVE-2025-13012
  • CVE-2025-13013
  • CVE-2025-13014
  • CVE-2025-13015
  • CVE-2025-13016
  • CVE-2025-13017
  • CVE-2025-13018
  • CVE-2025-13019
  • CVE-2025-13020

References

  • https://access.redhat.com/security/updates/classification/#important
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 9.0

SRPM
firefox-140.5.0-1.el9_0.src.rpm SHA-256: 7f8a73e6aef57930bad52ff735ce7511681e269a88154934a0a03ec45b06d2cb
ppc64le
firefox-140.5.0-1.el9_0.ppc64le.rpm SHA-256: 5e0a209d097fb56b5e8676d612225bef328ea08ccaac94456f08455b89d72bd6
firefox-debuginfo-140.5.0-1.el9_0.ppc64le.rpm SHA-256: afe33c925e2075df066056cf079da14302cb93befab3898ba354bdc847087f05
firefox-debugsource-140.5.0-1.el9_0.ppc64le.rpm SHA-256: 77308533fa38c9f9eb5b1592795f7b2f48bbec9f0928ae775b482791fac003f7

Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 9.0

SRPM
firefox-140.5.0-1.el9_0.src.rpm SHA-256: 7f8a73e6aef57930bad52ff735ce7511681e269a88154934a0a03ec45b06d2cb
x86_64
firefox-140.5.0-1.el9_0.x86_64.rpm SHA-256: bab2373f74b5e3c6e3df6d09ccdea0a7cb44203f3b5e3777401a7e098620469f
firefox-debuginfo-140.5.0-1.el9_0.x86_64.rpm SHA-256: b6d2e4e08c403004ccf91933f771b05ba4a6f67f1149fbf0c6bbc954f1f39db6
firefox-debugsource-140.5.0-1.el9_0.x86_64.rpm SHA-256: af3db90e9f709c6d2afde7cb9fb0cfa302a11da6e9ed30d30dc58a6d4ec7bb44

Red Hat Enterprise Linux for ARM 64 - 4 years of updates 9.0

SRPM
firefox-140.5.0-1.el9_0.src.rpm SHA-256: 7f8a73e6aef57930bad52ff735ce7511681e269a88154934a0a03ec45b06d2cb
aarch64
firefox-140.5.0-1.el9_0.aarch64.rpm SHA-256: 208e8eda61f57b9d2deb33abe564c54e83b2814755e5021f7ef8be43f91c8e2c
firefox-debuginfo-140.5.0-1.el9_0.aarch64.rpm SHA-256: 42013835980a6e5defc302ffa9123d3f7a4fc75640a25dae9157cd2396993b16
firefox-debugsource-140.5.0-1.el9_0.aarch64.rpm SHA-256: 53464e0e2993ac8d3140f19ceb24bc64fe9ef9aae266153e3bbbcad3770479fd

Red Hat Enterprise Linux for IBM z Systems - 4 years of updates 9.0

SRPM
firefox-140.5.0-1.el9_0.src.rpm SHA-256: 7f8a73e6aef57930bad52ff735ce7511681e269a88154934a0a03ec45b06d2cb
s390x
firefox-140.5.0-1.el9_0.s390x.rpm SHA-256: d902c29d6bc1e5098bacdf92c40a029dd719687465fd8f80dfcd92839529b8ea
firefox-debuginfo-140.5.0-1.el9_0.s390x.rpm SHA-256: 965b588c7c7fbf2b8b1180325e204ef0ea56d81327faae0b3a255724fc14fc50
firefox-debugsource-140.5.0-1.el9_0.s390x.rpm SHA-256: 8f421fc6acb67100c99062e29a3d18db78aa7ffe64166ba98cd5fc08714525ba

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility