{"schema_version":"1.7.2","id":"OESA-2026-1540","modified":"2026-03-06T12:44:16Z","published":"2026-03-06T12:44:16Z","upstream":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"],"summary":"thunderbird security update","details":"Mozilla Thunderbird is a standalone mail and newsgroup client.\r\n\r\nSecurity Fix(es):\n\nIncorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2757)\n\nUse-after-free in the JavaScript: GC component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2758)\n\nIncorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2759)\n\nSandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2760)\n\nSandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2761)\n\nInteger overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2762)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2763)\n\nJIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2764)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2765)\n\nUse-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2766)\n\nUse-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2767)\n\nSandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2768)\n\nUse-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2769)\n\nUse-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2770)\n\nUndefined behavior in the DOM: Core &amp; HTML component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2771)\n\nUse-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2772)\n\nIncorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2773)\n\nInteger overflow in the Audio/Video component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2774)\n\nMitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2775)\n\nPrivilege escalation in the Messaging System component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2777)\n\nSandbox escape due to incorrect boundary conditions in the DOM: Core &amp; HTML component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2778)\n\nIncorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2779)\n\nInteger overflow in the Libraries component in NSS. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2781)\n\nPrivilege escalation in the Netmonitor component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2782)\n\nInformation disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2783)\n\nMitigation bypass in the DOM: Security component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2784)\n\nInvalid pointer in the JavaScript Engine component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2785)\n\nUse-after-free in the JavaScript Engine component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2786)\n\nUse-after-free in the DOM: Window and Location component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2787)\n\nIncorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2788)\n\nUse-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2789)\n\nSame-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2790)\n\nMitigation bypass in the Networking: Cache component. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2791)\n\nMemory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2792)\n\nMemory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 148, Firefox ESR &lt; 115.33, Firefox ESR &lt; 140.8, Thunderbird &lt; 148, and Thunderbird &lt; 140.8.(CVE-2026-2793)","affected":[{"package":{"ecosystem":"openEuler:24.03-LTS-SP3","name":"thunderbird","purl":"pkg:rpm/openEuler/thunderbird&distro=openEuler-24.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.8.0-1.oe2403sp3"}]}],"ecosystem_specific":{"aarch64":["thunderbird-140.8.0-1.oe2403sp3.aarch64.rpm","thunderbird-debuginfo-140.8.0-1.oe2403sp3.aarch64.rpm","thunderbird-debugsource-140.8.0-1.oe2403sp3.aarch64.rpm","thunderbird-librnp-rnp-140.8.0-1.oe2403sp3.aarch64.rpm","thunderbird-wayland-140.8.0-1.oe2403sp3.aarch64.rpm"],"src":["thunderbird-140.8.0-1.oe2403sp3.src.rpm"],"x86_64":["thunderbird-140.8.0-1.oe2403sp3.x86_64.rpm","thunderbird-debuginfo-140.8.0-1.oe2403sp3.x86_64.rpm","thunderbird-debugsource-140.8.0-1.oe2403sp3.x86_64.rpm","thunderbird-librnp-rnp-140.8.0-1.oe2403sp3.x86_64.rpm","thunderbird-wayland-140.8.0-1.oe2403sp3.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-1540"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2757"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2758"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2759"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2760"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2761"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2762"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2763"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2764"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2765"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2766"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2767"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2768"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2769"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2770"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2771"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2772"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2773"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2774"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2775"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2777"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2778"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2779"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2781"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2782"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2783"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2784"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2785"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2786"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2787"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2788"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2789"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2790"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2791"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2792"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2026-2793"}],"database_specific":{"severity":"Critical"}}
