OESA-2026-1087

Source
https://www.openeuler.org/en/security/security-bulletins/detail/?id=openEuler-SA-2026-1087
Import Source
https://repo.openeuler.org/security/data/osv/OESA-2026-1087.json
JSON Data
https://api.osv.dev/v1/vulns/OESA-2026-1087
Upstream
  • CVE-2025-14327
  • CVE-2026-0877
  • CVE-2026-0878
  • CVE-2026-0879
  • CVE-2026-0880
  • CVE-2026-0882
  • CVE-2026-0883
  • CVE-2026-0884
  • CVE-2026-0885
  • CVE-2026-0886
  • CVE-2026-0887
  • CVE-2026-0890
  • CVE-2026-0891
Published
2026-01-16T11:58:30Z
Modified
2026-01-16T12:30:20.010357Z
Summary
firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability. %if 0 %global mozdebugprefix /lib/debug %global mozdebugdir /lib/debug/ %global unamem %(uname -m) %global symbolsfilename -.en-US.-%(uname.crashreporter-symbols.zip %global symbolsfilepath /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip %global _finddebuginfoopts -p /lib/debug//-.en-US.-%(uname.crashreporter-symbols.zip -o debugcrashreporter.list %global crashreporterpkg_name mozilla-crashreporter--debuginfo

Security Fix(es):

Spoofing issue in the Downloads Panel component. This vulnerability affects Firefox < 146, Thunderbird < 146, and Firefox ESR < 140.7.(CVE-2025-14327)

Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0877)

Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0878)

Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0879)

Sandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0880)

Use-after-free in the IPC component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0882)

Information disclosure in the Networking component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0883)

Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0884)

Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0885)

Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox < 147, Firefox ESR < 115.32, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0886)

Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0887)

Spoofing issue in the DOM: Copy & Paste and Drag & Drop component. This vulnerability affects Firefox < 147, Firefox ESR < 140.7, Thunderbird < 147, and Thunderbird < 140.7.(CVE-2026-0890)

Multiple memory safety bugs were present in Mozilla Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146, and Thunderbird 146. Some of these bugs showed evidence of memory corruption, and it is presumed that with enough effort, some could have been exploited to run arbitrary code. This vulnerability affects Firefox < 147 and Firefox ESR < 140.7, threatening confidentiality, integrity, and availability.(CVE-2026-0891)

Database specific
{
    "severity": "Critical"
}
References

Affected packages

openEuler:24.03-LTS-SP3 / firefox

Package

Name
firefox
Purl
pkg:rpm/openEuler/firefox&distro=openEuler-24.03-LTS-SP3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
140.7.0-1.oe2403sp3

Ecosystem specific

{
    "aarch64": [
        "firefox-140.7.0-1.oe2403sp3.aarch64.rpm",
        "firefox-debuginfo-140.7.0-1.oe2403sp3.aarch64.rpm",
        "firefox-debugsource-140.7.0-1.oe2403sp3.aarch64.rpm"
    ],
    "src": [
        "firefox-140.7.0-1.oe2403sp3.src.rpm"
    ],
    "x86_64": [
        "firefox-140.7.0-1.oe2403sp3.x86_64.rpm",
        "firefox-debuginfo-140.7.0-1.oe2403sp3.x86_64.rpm",
        "firefox-debugsource-140.7.0-1.oe2403sp3.x86_64.rpm"
    ]
}

Database specific

source
"https://repo.openeuler.org/security/data/osv/OESA-2026-1087.json"