vulnerability
Rocky Linux: CVE-2025-8027: thunderbird (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:M/Au:N/C:C/I:N/A:N) | Sep 8, 2025 | Feb 5, 2026 | Feb 9, 2026 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:C/I:N/A:N)
Published
Sep 8, 2025
Added
Feb 5, 2026
Modified
Feb 9, 2026
Description
On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
Solutions
rocky-upgrade-firefoxrocky-upgrade-firefox-debuginforocky-upgrade-firefox-debugsourcerocky-upgrade-firefox-x11rocky-upgrade-thunderbirdrocky-upgrade-thunderbird-debuginforocky-upgrade-thunderbird-debugsource
References
- CVE-2025-8027
- https://attackerkb.com/topics/CVE-2025-8027
- CWE-457
- URL-https://errata.rockylinux.org/RLSA-2025:11747
- URL-https://errata.rockylinux.org/RLSA-2025:11748
- URL-https://errata.rockylinux.org/RLSA-2025:11797
- URL-https://errata.rockylinux.org/RLSA-2025:12187
- URL-https://errata.rockylinux.org/RLSA-2025:12188
- URL-https://errata.rockylinux.org/RLSA-2025:13676
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.