{"schema_version":"1.7.2","id":"OESA-2026-1264","modified":"2026-01-30T12:28:20Z","published":"2026-01-30T12:28:20Z","upstream":["CVE-2025-14321","CVE-2025-14322","CVE-2025-14323","CVE-2025-14324","CVE-2025-14325","CVE-2025-14327","CVE-2025-14328","CVE-2025-14329","CVE-2025-14330","CVE-2025-14331","CVE-2025-14333","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"],"summary":"thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nSecurity Fix(es):\n\nUse-after-free in the WebRTC: Signaling component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14321)\n\nSandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 115.31, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14322)\n\nPrivilege escalation in the DOM: Notifications component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 115.31, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14323)\n\nJIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 115.31, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14324)\n\nJIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14325)\n\nSpoofing issue in the Downloads Panel component. This vulnerability affects Firefox &lt; 146, Thunderbird &lt; 146, Firefox ESR &lt; 140.7, and Thunderbird &lt; 140.7.(CVE-2025-14327)\n\nPrivilege escalation in the Netmonitor component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14328)\n\nPrivilege escalation in the Netmonitor component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14329)\n\nJIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14330)\n\nSame-origin policy bypass in the Request Handling component. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 115.31, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14331)\n\nMemory safety bugs present in Firefox ESR 140.5, Thunderbird ESR 140.5, Firefox 145 and Thunderbird 145. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 146, Firefox ESR &lt; 140.6, Thunderbird &lt; 146, and Thunderbird &lt; 140.6.(CVE-2025-14333)\n\nMitigation bypass in the DOM: Security component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 115.32, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0877)\n\nSandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0878)\n\nSandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 115.32, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0879)\n\nSandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 115.32, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0880)\n\nUse-after-free in the IPC component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 115.32, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0882)\n\nInformation disclosure in the Networking component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0883)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0884)\n\nUse-after-free in the JavaScript: GC component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0885)\n\nIncorrect boundary conditions in the Graphics component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 115.32, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0886)\n\nClickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0887)\n\nSpoofing issue in the DOM: Copy &amp; Paste and Drag &amp; Drop component. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0890)\n\nMemory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 147, Firefox ESR &lt; 140.7, Thunderbird &lt; 147, and Thunderbird &lt; 140.7.(CVE-2026-0891)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"thunderbird","purl":"pkg:rpm/openEuler/thunderbird&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.7.0-1.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["thunderbird-140.7.0-1.oe2403sp3.aarch64.rpm","thunderbird-debuginfo-140.7.0-1.oe2403sp3.aarch64.rpm","thunderbird-debugsource-140.7.0-1.oe2403sp3.aarch64.rpm","thunderbird-librnp-rnp-140.7.0-1.oe2403sp3.aarch64.rpm","thunderbird-wayland-140.7.0-1.oe2403sp3.aarch64.rpm"],"src":["thunderbird-140.7.0-1.oe2403sp3.src.rpm"],"x86_64":["thunderbird-140.7.0-1.oe2403sp3.x86_64.rpm","thunderbird-debuginfo-140.7.0-1.oe2403sp3.x86_64.rpm","thunderbird-debugsource-140.7.0-1.oe2403sp3.x86_64.rpm","thunderbird-librnp-rnp-140.7.0-1.oe2403sp3.x86_64.rpm","thunderbird-wayland-140.7.0-1.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1264"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14321"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14322"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14323"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14324"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14325"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14327"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14328"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14329"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14330"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14331"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-14333"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0877"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0878"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0879"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0880"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0882"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0883"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0884"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0885"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0886"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0887"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0890"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-0891"}],"database_specific":{"severity":"Critical"}}
