{"id":"ALSA-2025:1292","summary":"Important: thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.  \n\nSecurity Fix(es):  \n\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7 (CVE-2025-1017)\n  * firefox: thunderbird: Use-after-free in Custom Highlight (CVE-2025-1010)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7 (CVE-2025-1016)\n  * firefox: thunderbird: Potential opening of private browsing tabs in normal browsing windows (CVE-2025-1013)\n  * firefox: thunderbird: A bug in WebAssembly code generation could result in a crash (CVE-2025-1011)\n  * thunderbird: Unsanitized address book fields (CVE-2025-1015)\n  * firefox: thunderbird: Use-after-free in XSLT (CVE-2025-1009)\n  * thunderbird: Address of e-mail sender can be spoofed by malicious email (CVE-2025-0510)\n  * firefox: thunderbird: Certificate length was not properly checked (CVE-2025-1014)\n  * firefox: thunderbird: Use-after-free during concurrent delazification (CVE-2025-1012)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-02-04T03:34:23.824693Z","published":"2025-02-11T00:00:00Z","related":["CVE-2025-0510","CVE-2025-1009","CVE-2025-1010","CVE-2025-1011","CVE-2025-1012","CVE-2025-1013","CVE-2025-1014","CVE-2025-1015","CVE-2025-1016","CVE-2025-1017"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2025:1292"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-0510"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1009"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1010"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1011"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1012"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1013"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1014"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1015"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1016"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-1017"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343748"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343750"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343752"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343754"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343756"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343759"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343760"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343762"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343764"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2343765"},{"type":"ADVISORY","url":"https://errata.almalinux.org/8/ALSA-2025-1292.html"}],"affected":[{"package":{"name":"thunderbird","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/thunderbird"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"128.7.0-1.el8_10.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2025:1292.json"}}],"schema_version":"1.7.3"}