INFSA-2025:12188: thunderbird security update
Information about definition
Identificator: INFSA-2025:12188
Type: security
Release date: 2025-07-31 15:58:20 UTC
Information about package
Mozilla Thunderbird is a standalone mail and newsgroup client.
Vulnerabilities description
- CVE-2025-8027
Mozilla Firefox could allow a remote attacker to obtain sensitive information. The JavaScript engine only wrote partial return value to stack. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to obtain sensitive information.
- CVE-2025-8028
A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: On arm64, a WASM br_table instruction with a large number of entries could lead to the label being too far from the instruction, causing truncation and incorrect computation of the branch address.
- CVE-2025-8029
A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Firefox executed javascript: URLs when used in object and embed tags.
- CVE-2025-8030
Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by insufficient escaping in the “Copy as cURL” feature. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the vulnerable system or cause a denial of service.
- CVE-2025-8031
Mozilla Firefox could allow a remote attacker to bypass security restrictions, caused by incorrect URL stripping in CSP reports. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to bypass security restrictions.
- CVE-2025-8032
Mozilla Firefox could allow a remote attacker to bypass security restrictions. The XSLT document loading did not correctly propagate the source document which bypassed its CSP. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to bypass security restrictions.
- CVE-2025-8033
Mozilla Firefox is vulnerable to a denial of service, caused by the incorrect JavaScript state machine for generators. By persuading a victim to visit a specially crafted Web site, a remote attacker could exploit this vulnerability to trigger a NULL pointer dereference error.
- CVE-2025-8034
Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by memory safety bugs within the browser engine. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the vulnerable system or cause a denial of service.
- CVE-2025-8035
Mozilla Firefox could allow a remote attacker to execute arbitrary code on the system, caused by memory safety bugs within the browser engine. By persuading a victim to visit a specially-crafted Web site, a remote attacker could exploit this vulnerability using unknown attack vectors to execute arbitrary code on the vulnerable system or cause a denial of service.
Severity level
CVE | Score CVSS 2.0 | Score CVSS 3.x | Score CVSS 4.0 |
---|---|---|---|
NIST — CVE-2025-8027
|
no information | 7.5 | no information |
NIST — CVE-2025-8028
|
no information | 7.5 | no information |
NIST — CVE-2025-8029
|
no information | 6.1 | no information |
NIST — CVE-2025-8030
|
no information | 6.1 | no information |
NIST — CVE-2025-8031
|
no information | 6.1 | no information |
NIST — CVE-2025-8032
|
no information | 6.1 | no information |
NIST — CVE-2025-8033
|
no information | 3.4 | no information |
NIST — CVE-2025-8034
|
no information | 7.5 | no information |
NIST — CVE-2025-8035
|
no information | 7.5 | no information |
Updated packages