[ALSA-2026:0924] Important: thunderbird security update
Type:
security
Severity:
important
Release date:
2026-01-24
Description:
Mozilla Thunderbird is a standalone mail and newsgroup client. Security Fix(es): * firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327) * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878) * firefox: Use-after-free in the IPC component (CVE-2026-0882) * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884) * firefox: Information disclosure in the Networking component (CVE-2026-0883) * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877) * firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890) * firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879) * firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880) * firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 thunderbird-140.7.0-1.el9_7.alma.1.aarch64.rpm 03651359857d500fd5873cc5e1b8adad3f724cda05b22b889b7a4f4d6f54ab48
ppc64le thunderbird-140.7.0-1.el9_7.alma.1.ppc64le.rpm e3010e1a6b7af618636374805c3ae2cf335211d30671c61e832de65e3a7d8235
s390x thunderbird-140.7.0-1.el9_7.alma.1.s390x.rpm fef31c00c698f8d7270c8a68f3f9d9bfea32fe76da86dad31f050801f7d9be7d
x86_64 thunderbird-140.7.0-1.el9_7.alma.1.x86_64.rpm 0a29889c8d7bdee2f36bd5206c88832e2a56591bf1c35a88cc0aa30af6dad615
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.