Memory safety bugs fixed in Thunderbird ESR 140.10.2 and Thunderbird 150.0.2
Summary
| CVE | CVE-2026-8092 |
|---|---|
| State | PUBLISHED |
| Assigner | mozilla |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-07 13:16:14 UTC |
| Updated | 2026-05-11 15:16:40 UTC |
| Description | Memory safety bugs present in Thunderbird ESR 140.10.1 and Thunderbird 150.0.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability was fixed in Firefox 150.0.2, Firefox ESR 140.10.2, Firefox ESR 115.35.2, Thunderbird 150.0.2, and Thunderbird 140.10.2. |
Risk And Classification
Primary CVSS: v3.1 8.1 HIGH from ADP
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS: 0.000170000 probability, percentile 0.042020000 (date 2026-05-12)
Problem Types: CWE-125 | CWE-416 | CWE-787 | CWE-125 CWE-125 Out-of-bounds Read | CWE-787 CWE-787 Out-of-bounds Write | CWE-416 CWE-416 Use After Free
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | ADP | DECLARED | 8.1 | HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 8.1 | HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
HighPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
NVD Known Affected Configurations (CPE 2.3)
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Mozilla | Firefox | unaffected 115.35.2 115.* rpm | Not specified |
| CNA | Mozilla | Firefox | unaffected 140.10.2 140.* rpm | Not specified |
| CNA | Mozilla | Firefox | unaffected 150.0.2 * rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 140.10.2 140.* rpm | Not specified |
| CNA | Mozilla | Thunderbird | unaffected 150.0.2 * rpm | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.mozilla.org/security/advisories/mfsa2026-43 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-42 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-41 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-40 | [email protected] | www.mozilla.org | Vendor Advisory |
| www.mozilla.org/security/advisories/mfsa2026-44 | [email protected] | www.mozilla.org | Vendor Advisory |
| bugzilla.mozilla.org/buglist.cgi | [email protected] | bugzilla.mozilla.org | Broken Link |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Andrew McCreight, Christian Holler, Lee Salzman, Maurice Dauer, Tom Schuster, Wayne Mery and the Mozilla Fuzzing Team (en)
There are currently no legacy QID mappings associated with this CVE.