{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.7.0-112.295.1","MozillaFirefox-devel":"140.7.0-112.295.1","MozillaFirefox-translations-common":"140.7.0-112.295.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.7.0-112.295.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.7.0-112.295.1","MozillaFirefox-devel":"140.7.0-112.295.1","MozillaFirefox-translations-common":"140.7.0-112.295.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server LTSS Extended Security 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20LTSS%20Extended%20Security%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.7.0-112.295.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 140.7.0 ESR (bsc#1256340).\n    \n- MFSA 2026-03\n  * CVE-2026-0877: Mitigation bypass in the DOM: Security component\n  * CVE-2026-0878: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component\n  * CVE-2026-0879: Sandbox escape due to incorrect boundary conditions in the Graphics component\n  * CVE-2026-0880: Sandbox escape due to integer overflow in the Graphics component\n  * CVE-2026-0882: Use-after-free in the IPC component\n  * CVE-2025-14327: Spoofing issue in the Downloads Panel component\n  * CVE-2026-0883: Information disclosure in the Networking component\n  * CVE-2026-0884: Use-after-free in the JavaScript Engine component\n  * CVE-2026-0885: Use-after-free in the JavaScript: GC component\n  * CVE-2026-0886: Incorrect boundary conditions in the Graphics component\n  * CVE-2026-0887: Clickjacking issue, information disclosure in the PDF Viewer component\n  * CVE-2026-0890: Spoofing issue in the DOM: Copy-Paste and Drag-Drop component\n  * CVE-2026-0891: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147\n  ","id":"SUSE-SU-2026:0122-1","modified":"2026-01-14T08:49:21Z","published":"2026-01-14T08:49:21Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260122-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256340"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-14327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0878"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0879"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0880"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0882"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0883"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0884"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0885"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0886"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0887"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0890"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0891"}],"related":["CVE-2025-14327","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2025-14327","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"]}