First published: Mon Apr 21 2025(Updated: )
Important: thunderbird security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux for Power, little endian - Extended Update Support | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
Red Hat Enterprise Linux for x86_64 - Extended Update Support | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server | ||
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux for ARM64 EUS | ||
redhat/thunderbird | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debuginfo | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debugsource | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debuginfo | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debugsource | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debuginfo | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird-debugsource | <128.9.0-2.el9_2 | 128.9.0-2.el9_2 |
redhat/thunderbird | <128.9.0-2.el9_2.aa | 128.9.0-2.el9_2.aa |
redhat/thunderbird-debuginfo | <128.9.0-2.el9_2.aa | 128.9.0-2.el9_2.aa |
redhat/thunderbird-debugsource | <128.9.0-2.el9_2.aa | 128.9.0-2.el9_2.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:4027 is classified as important.
RHSA-2025:4027 addresses vulnerabilities including a use-after-free vulnerability triggered by XSLTProcessor (CVE-2025-3028) and URL bar spoofing via non-BMP Unicode characters.
To fix RHSA-2025:4027, you need to update the Thunderbird package to version 128.9.0-2.el9_2.
Affected versions include various installations of Red Hat Enterprise Linux for x86_64, Power, and ARM 64.
There are no documented workarounds for the vulnerabilities addressed in RHSA-2025:4027; applying the update is strongly recommended.