On 64-bit platforms IonMonkey-JIT only wrote 32 bits of the 64-bit return value space on the stack. Baseline-JIT, however, read the entire 64 bits. This vulnerability affects Firefox < 141, Firefox ESR < 115.26, Firefox ESR < 128.13, Firefox ESR < 140.1, Thunderbird < 141, Thunderbird < 128.13, and Thunderbird < 140.1.
The code uses a variable that has not been initialized, leading to unpredictable or unintended results.
Link | Tags |
---|---|
https://bugzilla.mozilla.org/show_bug.cgi?id=1968423 | permissions required |
https://www.mozilla.org/security/advisories/mfsa2025-56/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-57/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-58/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-59/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-61/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-62/ | vendor advisory |
https://www.mozilla.org/security/advisories/mfsa2025-63/ | vendor advisory |