vulnerability
Rocky Linux: CVE-2025-5264: thunderbird (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:L/AC:M/Au:S/C:P/I:P/A:P) | Jul 29, 2025 | Jul 31, 2025 | Oct 21, 2025 |
Severity
4
CVSS
(AV:L/AC:M/Au:S/C:P/I:P/A:P)
Published
Jul 29, 2025
Added
Jul 31, 2025
Modified
Oct 21, 2025
Description
Due to insufficient escaping of the newline character in the “Copy as cURL” feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 139, Firefox ESR < 115.24, Firefox ESR < 128.11, Thunderbird < 139, and Thunderbird < 128.11.
Solutions
rocky-upgrade-firefoxrocky-upgrade-firefox-debuginforocky-upgrade-firefox-debugsourcerocky-upgrade-firefox-x11rocky-upgrade-thunderbirdrocky-upgrade-thunderbird-debuginforocky-upgrade-thunderbird-debugsource
References
- CVE-2025-5264
- https://attackerkb.com/topics/CVE-2025-5264
- CWE-77
- URL-https://errata.rockylinux.org/RLSA-2025:8293
- URL-https://errata.rockylinux.org/RLSA-2025:8308
- URL-https://errata.rockylinux.org/RLSA-2025:8341
- URL-https://errata.rockylinux.org/RLSA-2025:8607
- URL-https://errata.rockylinux.org/RLSA-2025:8608
- URL-https://errata.rockylinux.org/RLSA-2025:8756
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.