- 发布:
- 2026-03-30
- 已更新:
- 2026-03-30
RHSA-2026:6188 - Security Advisory
概述
Important: thunderbird security update
类型/严重性
Security Advisory: Important
Red Hat Lightspeed patch analysis
识别并修复受此公告影响的系统。
标题
An update for thunderbird is now available for Red Hat Enterprise Linux 9.
Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
描述
Mozilla Thunderbird is a standalone mail and newsgroup client.
Security Fix(es):
- firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)
- firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)
- firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)
- firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)
- firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)
- firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)
- firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)
- firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)
- firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)
- firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)
- firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)
- firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)
- firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)
- firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)
- firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)
- firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)
- firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)
- firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)
- firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)
- firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)
- firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)
- firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)
- firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)
- firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)
- firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)
- firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)
- thunderbird: Out of bounds read in IMAP parsing (CVE-2026-4371)
- thunderbird: Spoofing issue in Thunderbird (CVE-2026-3889)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
解决方案
For details on how to apply this update, which includes the changes described in this advisory, refer to:
受影响的产品
- Red Hat Enterprise Linux for x86_64 9 x86_64
- Red Hat Enterprise Linux for IBM z Systems 9 s390x
- Red Hat Enterprise Linux for Power, little endian 9 ppc64le
- Red Hat Enterprise Linux for ARM 64 9 aarch64
修复
- BZ - 2450710 - CVE-2026-4701 firefox: thunderbird: Use-after-free in the JavaScript Engine component
- BZ - 2450711 - CVE-2026-4721 firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149
- BZ - 2450712 - CVE-2026-4717 firefox: thunderbird: Privilege escalation in the Netmonitor component
- BZ - 2450713 - CVE-2026-4688 firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component
- BZ - 2450714 - CVE-2026-4706 firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component
- BZ - 2450715 - CVE-2026-4695 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component
- BZ - 2450718 - CVE-2026-4689 firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
- BZ - 2450719 - CVE-2026-4698 firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component
- BZ - 2450720 - CVE-2026-4716 firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component
- BZ - 2450721 - CVE-2026-4684 firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component
- BZ - 2450722 - CVE-2026-4705 firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component
- BZ - 2450723 - CVE-2026-4715 firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component
- BZ - 2450724 - CVE-2026-4685 firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component
- BZ - 2450725 - CVE-2026-4714 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component
- BZ - 2450726 - CVE-2026-4709 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component
- BZ - 2450727 - CVE-2026-4710 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component
- BZ - 2450728 - CVE-2026-4712 firefox: thunderbird: Information disclosure in the Widget: Cocoa component
- BZ - 2450729 - CVE-2026-4697 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component
- BZ - 2450730 - CVE-2026-4713 firefox: thunderbird: Incorrect boundary conditions in the Graphics component
- BZ - 2450732 - CVE-2026-4690 firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
- BZ - 2450733 - CVE-2026-4711 firefox: thunderbird: Use-after-free in the Widget: Cocoa component
- BZ - 2450734 - CVE-2026-4686 firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component
- BZ - 2450735 - CVE-2026-4708 firefox: thunderbird: Incorrect boundary conditions in the Graphics component
- BZ - 2450738 - CVE-2026-4691 firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component
- BZ - 2450739 - CVE-2026-4699 firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component
- BZ - 2450740 - CVE-2026-4696 firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component
- BZ - 2450741 - CVE-2026-4693 firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component
- BZ - 2450742 - CVE-2026-4718 firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component
- BZ - 2450744 - CVE-2026-4702 firefox: thunderbird: JIT miscompilation in the JavaScript Engine component
- BZ - 2450746 - CVE-2026-4719 firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component
- BZ - 2450747 - CVE-2026-4694 firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component
- BZ - 2450748 - CVE-2026-4692 firefox: thunderbird: Sandbox escape in the Responsive Design Mode component
- BZ - 2450751 - CVE-2026-4720 firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149
- BZ - 2450752 - CVE-2026-4700 firefox: thunderbird: Mitigation bypass in the Networking: HTTP component
- BZ - 2450755 - CVE-2026-4707 firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component
- BZ - 2450756 - CVE-2026-4704 firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component
- BZ - 2450757 - CVE-2026-4687 firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component
- BZ - 2451001 - CVE-2026-4371 thunderbird: Out of bounds read in IMAP parsing
- BZ - 2451006 - CVE-2026-3889 thunderbird: Spoofing issue in Thunderbird
CVE
- CVE-2026-3889
- CVE-2026-4371
- CVE-2026-4684
- CVE-2026-4685
- CVE-2026-4686
- CVE-2026-4687
- CVE-2026-4688
- CVE-2026-4689
- CVE-2026-4690
- CVE-2026-4691
- CVE-2026-4692
- CVE-2026-4693
- CVE-2026-4694
- CVE-2026-4695
- CVE-2026-4696
- CVE-2026-4697
- CVE-2026-4698
- CVE-2026-4699
- CVE-2026-4700
- CVE-2026-4701
- CVE-2026-4702
- CVE-2026-4704
- CVE-2026-4705
- CVE-2026-4706
- CVE-2026-4707
- CVE-2026-4708
- CVE-2026-4709
- CVE-2026-4710
- CVE-2026-4711
- CVE-2026-4712
- CVE-2026-4713
- CVE-2026-4714
- CVE-2026-4715
- CVE-2026-4716
- CVE-2026-4717
- CVE-2026-4718
- CVE-2026-4719
- CVE-2026-4720
- CVE-2026-4721
Red Hat Enterprise Linux for x86_64 9
| SRPM | |
|---|---|
| thunderbird-140.9.0-1.el9_7.src.rpm | SHA-256: a89512720447c648e3e77e5e5c1101721f16da3382eccdd307e7b3862696226a |
| x86_64 | |
| thunderbird-140.9.0-1.el9_7.x86_64.rpm | SHA-256: 7a797e98411b31095dc461c9370cc58fe74a623424e5297ce674b9cffe84800e |
| thunderbird-debuginfo-140.9.0-1.el9_7.x86_64.rpm | SHA-256: 7b1c32da76638fd0cf8744ab0c9edd8f9f634107c70f94f4343de486e5359398 |
| thunderbird-debugsource-140.9.0-1.el9_7.x86_64.rpm | SHA-256: f1c67ec09572dee3dfdd457cbd1dda8838612fa76f8b2074dd3193ec079dec35 |
Red Hat Enterprise Linux for IBM z Systems 9
| SRPM | |
|---|---|
| thunderbird-140.9.0-1.el9_7.src.rpm | SHA-256: a89512720447c648e3e77e5e5c1101721f16da3382eccdd307e7b3862696226a |
| s390x | |
| thunderbird-140.9.0-1.el9_7.s390x.rpm | SHA-256: 5c85924ebad385ab0827ee03294f3f52c3149809e06c86dfc725ad77a489d109 |
| thunderbird-debuginfo-140.9.0-1.el9_7.s390x.rpm | SHA-256: 64c777922d78640d063677f3f6134bfef1db67ce450f8a23d2ac973eb1a7020a |
| thunderbird-debugsource-140.9.0-1.el9_7.s390x.rpm | SHA-256: 754c9802ae629009e60d0c5b70cfb34dae691ba9011b303c09cab9f095334302 |
Red Hat Enterprise Linux for Power, little endian 9
| SRPM | |
|---|---|
| thunderbird-140.9.0-1.el9_7.src.rpm | SHA-256: a89512720447c648e3e77e5e5c1101721f16da3382eccdd307e7b3862696226a |
| ppc64le | |
| thunderbird-140.9.0-1.el9_7.ppc64le.rpm | SHA-256: 85f4297553838f75abdaf0d0614f59c95d527e3d62eeaf983ebb46800fb982db |
| thunderbird-debuginfo-140.9.0-1.el9_7.ppc64le.rpm | SHA-256: 087535ea460b93681a0ad67f38a38146fdac3faf6dc72baab19f5280eca95a90 |
| thunderbird-debugsource-140.9.0-1.el9_7.ppc64le.rpm | SHA-256: 5a47be85635774e598db8800941f2769c93352e55511861ebf1e900768d911be |
Red Hat Enterprise Linux for ARM 64 9
| SRPM | |
|---|---|
| thunderbird-140.9.0-1.el9_7.src.rpm | SHA-256: a89512720447c648e3e77e5e5c1101721f16da3382eccdd307e7b3862696226a |
| aarch64 | |
| thunderbird-140.9.0-1.el9_7.aarch64.rpm | SHA-256: 7d3263d7b0e6cb2770631159f5c4ada12b6d27b72c29229f3d555ddd72d94015 |
| thunderbird-debuginfo-140.9.0-1.el9_7.aarch64.rpm | SHA-256: 4e6f3c630f33e65f66c45821e3ecf69d5b35bb31cb4a3ab5f38a6288491443aa |
| thunderbird-debugsource-140.9.0-1.el9_7.aarch64.rpm | SHA-256: 421b0b552c5d8a4efd6b1cf4465fd17695fb772f05b2b778e4587f3d01448e90 |
Red Hat 安全团队联络方式为 secalert@redhat.com。 更多联络细节请参考 https://access.redhat.com/security/team/contact/。