CVE-2026-4371

NameCVE-2026-4371
DescriptionA malicious mail server could send malformed strings with negative lengths, causing the parser to read memory outside the buffer. If a mail server or connection to a mail server were compromised, an attacker could cause the parser to malfunction, potentially crashing Thunderbird or leaking sensitive data. This vulnerability was fixed in Thunderbird 149 and Thunderbird 140.9.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-4511-1, DSA-6179-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
thunderbird (PTS)bullseye1:115.12.0-1~deb11u1vulnerable
bullseye (security)1:140.9.1esr-1~deb11u1fixed
bookworm1:140.6.0esr-1~deb12u1vulnerable
bookworm (security)1:140.9.1esr-1~deb12u1fixed
trixie1:140.8.0esr-1~deb13u1vulnerable
trixie (security)1:140.9.1esr-1~deb13u1fixed
forky1:140.9.0esr-1fixed
sid1:140.9.1esr-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
thunderbirdsourcebullseye1:140.9.0esr-1~deb11u1DLA-4511-1
thunderbirdsourcebookworm1:140.9.0esr-1~deb12u1DSA-6179-1
thunderbirdsourcetrixie1:140.9.0esr-1~deb13u1DSA-6179-1
thunderbirdsource(unstable)1:140.9.0esr-1

Notes

https://www.mozilla.org/en-US/security/advisories/mfsa2026-24/#CVE-2026-4371

Search for package or bug name: Reporting problems