Package thunderbird: Information
Source package: thunderbird
Version: 148.0-alt2
Build time: Mar 1, 2026, 01:42 AM in the task #409600
Category: Networking/Mail
Report package bugHome page: https://www.thunderbird.net
License: MPL-2.0
Summary: Thunderbird is Mozilla's e-mail client
Description:
Thunderbird is Mozilla's next generation e-mail client. Thunderbird makes emailing safer, faster and easier than ever before and can also scale to meet the most sophisticated organizational needs. The package contains Lightning - an integrated calendar for Thunderbird.
List of RPM packages built from this SRPM:
thunderbird (x86_64, aarch64)
thunderbird-debuginfo (x86_64, aarch64)
thunderbird (x86_64, aarch64)
thunderbird-debuginfo (x86_64, aarch64)
Maintainer: Ajrat Makhmutov
List of contributors:
Ajrat Makhmutov
Ivan A. Melnikov
Pavel Vasenkov
Andrey Cherepanov
Grigory Ustinov
Alexey Sheplyakov
Aleksei Nikiforov
Gleb Fotengauer-Malinovskiy
Paul Wolneykien
Anton Farygin
Vladimir Didenko
Alexey Gladkov
Alexey Morozov
Ajrat Makhmutov
Ivan A. Melnikov
Pavel Vasenkov
Andrey Cherepanov
Grigory Ustinov
Alexey Sheplyakov
Aleksei Nikiforov
Gleb Fotengauer-Malinovskiy
Paul Wolneykien
Anton Farygin
Vladimir Didenko
Alexey Gladkov
Alexey Morozov
Last changed
Feb. 28, 2026 Ajrat Makhmutov 148.0-alt2
- Update l10n for the 148.
Feb. 25, 2026 Ajrat Makhmutov 148.0-alt1
- New version. - Fixes: + CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component + CVE-2026-2758: Use-after-free in the JavaScript: GC component + CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component + CVE-2026-2795: Use-after-free in the JavaScript: GC component + CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component + CVE-2026-2761: Sandbox escape in the Graphics: WebRender component + CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component + CVE-2026-2763: Use-after-free in the JavaScript Engine component + CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component + CVE-2026-2796: JIT miscompilation in the JavaScript: WebAssembly component + CVE-2026-2797: Use-after-free in the JavaScript: GC component + CVE-2026-2765: Use-after-free in the JavaScript Engine component + CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component + CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component + CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component + CVE-2026-2798: Use-after-free in the DOM: Core & HTML component + CVE-2026-2769: Use-after-free in the Storage: IndexedDB component + CVE-2026-2799: Use-after-free in the DOM: Core & HTML component + CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component + CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component + CVE-2026-2772: Use-after-free in the Audio/Video: Playback component + CVE-2026-2773: Incorrect boundary conditions in the Web Audio component + CVE-2026-2774: Integer overflow in the Audio/Video component + CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component + CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software + CVE-2026-2777: Privilege escalation in the Messaging System component + CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component + CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component + CVE-2026-2800: Spoofing issue in the WebAuthn component in Firefox for Android + CVE-2026-2780: Privilege escalation in the Netmonitor component + CVE-2026-2781: Integer overflow in the Libraries component in NSS + CVE-2026-2801: Incorrect boundary conditions in the JavaScript: WebAssembly component + CVE-2026-2782: Privilege escalation in the Netmonitor component + CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component + CVE-2026-2802: Race condition in the JavaScript: GC component + CVE-2026-2803: Information disclosure, mitigation bypass in the Settings UI component + CVE-2026-2784: Mitigation bypass in the DOM: Security component + CVE-2026-2785: Invalid pointer in the JavaScript Engine component + CVE-2026-2804: Use-after-free in the JavaScript: WebAssembly component + CVE-2026-2786: Use-after-free in the JavaScript Engine component + CVE-2026-2805: Invalid pointer in the DOM: Core & HTML component + CVE-2026-2787: Use-after-free in the DOM: Window and Location component + CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component + CVE-2026-2789: Use-after-free in the Graphics: ImageLib component + CVE-2026-2806: Uninitialized memory in the Graphics: Text component + CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component + CVE-2026-2791: Mitigation bypass in the Networking: Cache component + CVE-2026-2807: Memory safety bugs fixed in Firefox 148 and Thunderbird 148 + CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 + CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148
Feb. 20, 2026 Ajrat Makhmutov 147.0.2-alt1
- New version. - Fixes: + CVE-2026-2447: Heap buffer overflow in libvpx