thunderbird-debugsource vulnerabilities

Direct Vulnerabilities

Known vulnerabilities in the thunderbird-debugsource package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
CVE-2026-2773

<0:140.8.0-2.el10_1
  • M
CVE-2026-2788

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
Out-of-bounds Write

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
CVE-2026-2769

<0:140.8.0-2.el10_1
  • H
CVE-2026-2775

<0:140.8.0-2.el10_1
  • H
Integer Overflow or Wraparound

<0:140.8.0-2.el10_1
  • L
CVE-2026-2791

<0:140.8.0-2.el10_1
  • M
CVE-2026-2779

<0:140.8.0-2.el10_1
  • H
CVE-2026-2447

<0:140.8.0-2.el10_1
  • H
CVE-2026-2757

<0:140.8.0-2.el10_1
  • H
CVE-2026-2777

<0:140.8.0-2.el10_1
  • H
Out-of-bounds Write

<0:140.8.0-2.el10_1
  • H
CVE-2026-2759

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • L
CVE-2026-2790

<0:140.8.0-2.el10_1
  • M
Use After Free

<0:140.8.0-2.el10_1
  • M
Use After Free

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • M
CVE-2026-2784

<0:140.8.0-2.el10_1
  • H
CVE-2026-2768

<0:140.8.0-2.el10_1
  • M
Access of Resource Using Incompatible Type ('Type Confusion')

<0:140.8.0-2.el10_1
  • M
Integer Overflow or Wraparound

<0:140.8.0-2.el10_1
  • M
Use After Free

<0:140.8.0-2.el10_1
  • M
CVE-2026-2780

<0:140.8.0-2.el10_1
  • M
CVE-2026-2782

<0:140.8.0-2.el10_1
  • M
Access of Uninitialized Pointer

<0:140.8.0-2.el10_1
  • H
CVE-2026-2771

<0:140.8.0-2.el10_1
  • H
CVE-2026-2761

<0:140.8.0-2.el10_1
  • H
CVE-2026-2760

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
CVE-2026-2778

<0:140.8.0-2.el10_1
  • H
Use After Free

<0:140.8.0-2.el10_1
  • H
CVE-2026-2776

<0:140.8.0-2.el10_1
  • H
Integer Overflow or Wraparound

<0:140.8.0-2.el10_1
  • L
CVE-2026-0890

<0:140.7.0-1.el10_1
  • L
CVE-2026-0890

<0:140.7.0-1.el10_0
  • M
CVE-2026-0886

<0:140.7.0-1.el10_1
  • M
CVE-2026-0886

<0:140.7.0-1.el10_0
  • M
CVE-2026-0885

<0:140.7.0-1.el10_1
  • M
CVE-2026-0885

<0:140.7.0-1.el10_0
  • M
CVE-2026-0883

<0:140.7.0-1.el10_1
  • M
CVE-2026-0883

<0:140.7.0-1.el10_0
  • M
Authentication Bypass

<0:140.7.0-1.el10_1
  • M
CVE-2026-0887

<0:140.7.0-1.el10_1
  • M
CVE-2026-0884

<0:140.7.0-1.el10_1
  • M
CVE-2026-0887

<0:140.7.0-1.el10_0
  • M
Authentication Bypass

<0:140.7.0-1.el10_0
  • M
CVE-2026-0884

<0:140.7.0-1.el10_0
  • H
CVE-2026-0877

<0:140.7.0-1.el10_1
  • H
CVE-2026-0877

<0:140.7.0-1.el10_0
  • H
CVE-2026-0882

<0:140.7.0-1.el10_1
  • H
CVE-2026-0882

<0:140.7.0-1.el10_0
  • H
CVE-2026-0891

<0:140.7.0-1.el10_1
  • H
CVE-2026-0879

<0:140.7.0-1.el10_1
  • H
CVE-2026-0891

<0:140.7.0-1.el10_0
  • H
CVE-2026-0879

<0:140.7.0-1.el10_0
  • H
CVE-2026-0880

<0:140.7.0-1.el10_1
  • H
CVE-2026-0880

<0:140.7.0-1.el10_0
  • H
CVE-2026-0878

<0:140.7.0-1.el10_1
  • H
CVE-2026-0878

<0:140.7.0-1.el10_0
  • M
CVE-2025-14330

<0:140.6.0-1.el10_0
  • H
Use After Free

<0:140.6.0-1.el10_0
  • M
CVE-2025-14329

<0:140.6.0-1.el10_0
  • M
CVE-2025-14328

<0:140.6.0-1.el10_0
  • M
Out-of-bounds Write

<0:140.6.0-1.el10_0
  • M
Origin Validation Error

<0:140.6.0-1.el10_0
  • H
CVE-2025-14324

<0:140.6.0-1.el10_0
  • H
CVE-2025-14323

<0:140.6.0-1.el10_0
  • H
CVE-2025-14322

<0:140.6.0-1.el10_0
  • M
Out-of-bounds Write

<0:140.6.0-1.el10_1
  • M
CVE-2025-14330

<0:140.6.0-1.el10_1
  • M
Origin Validation Error

<0:140.6.0-1.el10_1
  • H
CVE-2025-14324

<0:140.6.0-1.el10_1
  • M
CVE-2025-14329

<0:140.6.0-1.el10_1
  • M
CVE-2025-14328

<0:140.6.0-1.el10_1
  • H
Use After Free

<0:140.6.0-1.el10_1
  • H
CVE-2025-14322

<0:140.6.0-1.el10_1
  • H
CVE-2025-14323

<0:140.6.0-1.el10_1
  • L
Authentication Bypass

<0:140.5.0-2.el10_1
  • L
Authentication Bypass

<0:140.5.0-1.el10_0
  • M
Origin Validation Error

<0:140.5.0-2.el10_1
  • M
Origin Validation Error

<0:140.5.0-1.el10_0
  • M
Cross-site Scripting (XSS)

<0:140.5.0-2.el10_1
  • M
Cross-site Scripting (XSS)

<0:140.5.0-1.el10_0
  • M
Expired Pointer Dereference

<0:140.5.0-2.el10_1
  • M
Expired Pointer Dereference

<0:140.5.0-1.el10_0
  • M
Cross-site Scripting (XSS)

<0:140.5.0-2.el10_1
  • M
Cross-site Scripting (XSS)

<0:140.5.0-1.el10_0
  • M
Trust Boundary Violation

<0:140.5.0-2.el10_1
  • M
Trust Boundary Violation

<0:140.5.0-1.el10_0
  • M
Expired Pointer Dereference

<0:140.5.0-2.el10_1
  • M
Expired Pointer Dereference

<0:140.5.0-1.el10_0
  • H
Out-of-bounds Write

<0:140.5.0-2.el10_1
  • H
Out-of-bounds Write

<0:140.5.0-1.el10_0
  • H
Race Condition

<0:140.5.0-2.el10_1
  • H
Race Condition

<0:140.5.0-1.el10_0
  • H
Exposure of System Data to an Unauthorized Control Sphere

<0:140.4.0-2.el10_0
  • H
Out-of-bounds Write

<0:140.4.0-2.el10_0
  • H
Improper Access Control

<0:140.4.0-2.el10_0
  • M
Interpretation Conflict

<0:140.4.0-2.el10_0
  • H
Out-of-Bounds

<0:140.4.0-2.el10_0
  • H
Use After Free

<0:140.4.0-2.el10_0
  • H
Out-of-Bounds

<0:140.4.0-2.el10_0
  • M
Out-of-bounds Read

<0:140.3.0-1.el10_0
  • H
Access of Uninitialized Pointer

<0:140.3.0-1.el10_0
  • L
CVE-2025-10536

<0:140.3.0-1.el10_0
  • H
Use After Free

<0:140.3.0-1.el10_0
  • M
Integer Overflow or Wraparound

<0:140.3.0-1.el10_0
  • H
CVE-2025-10537

<0:140.3.0-1.el10_0
  • M
CVE-2025-10529

<0:140.3.0-1.el10_0
  • L
Resource Exhaustion

<0:128.14.0-3.el10_0
  • M
Improper Initialization

<0:128.14.0-3.el10_0
  • H
Out-of-Bounds

<0:128.14.0-3.el10_0
  • H
Out-of-Bounds

<0:128.14.0-3.el10_0
  • H
Information Exposure

<0:128.14.0-3.el10_0
  • M
Arbitrary Code Injection

<0:128.13.0-3.el10_0
  • M
Incorrect Default Permissions

<0:128.13.0-3.el10_0
  • M
Cross-site Scripting (XSS)

<0:128.13.0-3.el10_0
  • H
Out-of-Bounds

<0:128.13.0-3.el10_0
  • M
Protection Mechanism Failure

<0:128.13.0-3.el10_0
  • H
Use of Uninitialized Variable

<0:128.13.0-3.el10_0
  • L
NULL Pointer Dereference

<0:128.13.0-3.el10_0
  • H
Insufficient Protection Against Instruction Skipping Via Fault Injection

<0:128.13.0-3.el10_0
  • H
Out-of-Bounds

<0:128.13.0-3.el10_0
  • M
Information Exposure

<0:128.12.0-1.el10_0
  • M
Cross-site Scripting (XSS)

<0:128.12.0-1.el10_0
  • H
Use After Free

<0:128.12.0-1.el10_0
  • M
Use of Incorrectly-Resolved Name or Reference

<0:128.12.0-1.el10_0
  • H
Resource Exhaustion

<0:128.12.0-1.el10_0
  • H
Double Free

<0:128.11.0-1.el10_0
  • M
Improper Encoding or Escaping of Output

<0:128.11.0-1.el10_0
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:128.11.0-1.el10_0
  • H
Out-of-bounds Write

<0:128.11.0-1.el10_0
  • M
Out-of-Bounds

<0:128.11.0-1.el10_0
  • H
Out-of-bounds Write

<0:128.11.0-1.el10_0
  • M
Inclusion of Functionality from Untrusted Control Sphere

<0:128.11.0-1.el10_0
  • L
Improper Restriction of Rendered UI Layers or Frames

<0:128.11.0-1.el10_0
  • M
Out-of-Bounds

<0:128.11.0-1.el10_0
  • L
Authentication Bypass

<0:128.10.1-1.el10_0
  • H
Authentication Bypass

<0:128.10.1-1.el10_0
  • H
Authentication Bypass

<0:128.10.1-1.el10_0
  • M
Buffer Overflow

<0:128.10.0-1.el10_0
  • M
Out-of-bounds Read

<0:128.10.0-1.el10_0
  • H
Buffer Overflow

<0:128.10.0-1.el10_0
  • H
Arbitrary Code Injection

<0:128.10.0-1.el10_0
  • H
Insufficient Compartmentalization

<0:128.10.0-1.el10_0
  • L
User Interface (UI) Misrepresentation of Critical Information

<0:128.10.0-1.el10_0
  • M
Origin Validation Error

<0:128.9.0-2.el10_0
  • H
Buffer Overflow

<0:128.9.0-2.el10_0
  • H
Use After Free

<0:128.9.0-2.el10_0
  • H
Insufficient Granularity of Access Control

<0:128.10.0-1.el10_0
  • H
Information Exposure

<0:128.10.0-1.el10_0