{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.7.0-160000.1.1","MozillaFirefox-devel":"140.7.0-160000.1.1","MozillaFirefox-translations-common":"140.7.0-160000.1.1","MozillaFirefox-translations-other":"140.7.0-160000.1.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 16.0","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.7.0-160000.1.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.7.0-160000.1.1","MozillaFirefox-devel":"140.7.0-160000.1.1","MozillaFirefox-translations-common":"140.7.0-160000.1.1","MozillaFirefox-translations-other":"140.7.0-160000.1.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP applications 16.0","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.7.0-160000.1.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340).\n\n- MFSA 2026-03 (bsc#1256340)\n\n  * CVE-2026-0877: Mitigation bypass in the DOM: Security component\n  * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component\n  * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component\n  * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component\n  * CVE-2026-0882: Use-after-free in the IPC component\n  * CVE-2025-14327: Spoofing issue in the Downloads Panel component\n  * CVE-2026-0883: Information disclosure in the Networking component\n  * CVE-2026-0884: Use-after-free in the JavaScript Engine component\n  * CVE-2026-0885: Use-after-free in the JavaScript: GC component\n  * CVE-2026-0886: Incorrect boundary conditions in the Graphics component\n  * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component\n  * CVE-2026-0890: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component\n  * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147\n","id":"SUSE-SU-2026:20086-1","modified":"2026-01-15T16:33:38Z","published":"2026-01-15T16:33:38Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620086-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-14327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0891"}],"related":["CVE-2025-14327","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2025-14327","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"]}