{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Desktop Applications 15 SP7","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Desktop%20Applications%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-ESPOS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP4-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-ESPOS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP5-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP4-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP5-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP5-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP6-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP6-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP4","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP6","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"140.8.0-150200.152.222.1","MozillaFirefox-branding-upstream":"140.8.0-150200.152.222.1","MozillaFirefox-devel":"140.8.0-150200.152.222.1","MozillaFirefox-translations-common":"140.8.0-150200.152.222.1","MozillaFirefox-translations-other":"140.8.0-150200.152.222.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"MozillaFirefox","purl":"pkg:rpm/opensuse/MozillaFirefox&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.152.222.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 140.8.0 ESR (MFSA 2026-15) (bsc#1258568):\n  \n- CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video component\n- CVE-2026-2758: Use-after-free in the JavaScript: GC component\n- CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib component\n- CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component\n- CVE-2026-2761: Sandbox escape in the Graphics: WebRender component\n- CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component\n- CVE-2026-2763: Use-after-free in the JavaScript Engine component\n- CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component\n- CVE-2026-2765: Use-after-free in the JavaScript Engine component\n- CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component\n- CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component\n- CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component\n- CVE-2026-2769: Use-after-free in the Storage: IndexedDB component\n- CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component\n- CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component\n- CVE-2026-2772: Use-after-free in the Audio/Video: Playback component\n- CVE-2026-2773: Incorrect boundary conditions in the Web Audio component\n- CVE-2026-2774: Integer overflow in the Audio/Video component\n- CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component\n- CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software\n- CVE-2026-2777: Privilege escalation in the Messaging System component\n- CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component\n- CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component\n- CVE-2026-2780: Privilege escalation in the Netmonitor component\n- CVE-2026-2781: Integer overflow in the Libraries component in NSS\n- CVE-2026-2782: Privilege escalation in the Netmonitor component\n- CVE-2026-2783: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component\n- CVE-2026-2784: Mitigation bypass in the DOM: Security component\n- CVE-2026-2785: Invalid pointer in the JavaScript Engine component\n- CVE-2026-2786: Use-after-free in the JavaScript Engine component\n- CVE-2026-2787: Use-after-free in the DOM: Window and Location component\n- CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP component\n- CVE-2026-2789: Use-after-free in the Graphics: ImageLib component\n- CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component\n- CVE-2026-2791: Mitigation bypass in the Networking: Cache component\n- CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148\n- CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148\n  and Thunderbird 148\n","id":"SUSE-SU-2026:0871-1","modified":"2026-03-11T17:05:23Z","published":"2026-03-11T17:05:23Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260871-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258568"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2762"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2793"}],"related":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2776","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2780","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2776","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2780","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"]}