Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Firefox ESR < 128.6.
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:0080 https://access.redhat.com/errata/RHSA-2025:0080
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:0133 https://access.redhat.com/errata/RHSA-2025:0133
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:0135 https://access.redhat.com/errata/RHSA-2025:0135
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2025:0134 https://access.redhat.com/errata/RHSA-2025:0134
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Extended Lifecycle Support Via RHSA-2025:0132 https://access.redhat.com/errata/RHSA-2025:0132
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:0136 https://access.redhat.com/errata/RHSA-2025:0136
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:0138 https://access.redhat.com/errata/RHSA-2025:0138
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:0137 https://access.redhat.com/errata/RHSA-2025:0137
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:0147 https://access.redhat.com/errata/RHSA-2025:0147
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:0144 https://access.redhat.com/errata/RHSA-2025:0144
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:0162 https://access.redhat.com/errata/RHSA-2025:0162
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions Via RHSA-2025:0165 https://access.redhat.com/errata/RHSA-2025:0165
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.4 Extended Update Support Via RHSA-2025:0166 https://access.redhat.com/errata/RHSA-2025:0166
This issue has been addressed in the following products: Red Hat Enterprise Linux 9.2 Extended Update Support Via RHSA-2025:0167 https://access.redhat.com/errata/RHSA-2025:0167
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions Red Hat Enterprise Linux 8.6 Telecommunications Update Service Via RHSA-2025:0275 https://access.redhat.com/errata/RHSA-2025:0275
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2025:0281 https://access.redhat.com/errata/RHSA-2025:0281
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.8 Extended Update Support Via RHSA-2025:0284 https://access.redhat.com/errata/RHSA-2025:0284
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions Red Hat Enterprise Linux 8.4 Telecommunications Update Service Via RHSA-2025:0287 https://access.redhat.com/errata/RHSA-2025:0287
This issue has been addressed in the following products: Red Hat Enterprise Linux 8.2 Advanced Update Support Via RHSA-2025:0286 https://access.redhat.com/errata/RHSA-2025:0286