{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaThunderbird":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-common":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-other":"140.8.0-150200.8.260.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Module for Package Hub 15 SP7","name":"MozillaThunderbird","purl":"pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Package%20Hub%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.8.260.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaThunderbird":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-common":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-other":"140.8.0-150200.8.260.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Workstation Extension 15 SP7","name":"MozillaThunderbird","purl":"pkg:rpm/suse/MozillaThunderbird&distro=SUSE%20Linux%20Enterprise%20Workstation%20Extension%2015%20SP7"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.8.260.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaThunderbird":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-common":"140.8.0-150200.8.260.1","MozillaThunderbird-translations-other":"140.8.0-150200.8.260.1"}]},"package":{"ecosystem":"openSUSE:Leap 15.6","name":"MozillaThunderbird","purl":"pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.6"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"140.8.0-150200.8.260.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaThunderbird fixes the following issues:\n\nMozilla Thunderbird 140.8 MFSA 2026-17 (bsc#1258568):\n\n- CVE-2026-2757: Incorrect boundary conditions in the WebRTC: Audio/Video\n  component\n- CVE-2026-2758: Use-after-free in the JavaScript: GC component\n- CVE-2026-2759: Incorrect boundary conditions in the Graphics: ImageLib\n  component\n- CVE-2026-2760: Sandbox escape due to incorrect boundary conditions in the\n  Graphics: WebRender component\n- CVE-2026-2761: Sandbox escape in the Graphics: WebRender component\n- CVE-2026-2762: Integer overflow in the JavaScript: Standard Library component\n- CVE-2026-2763: Use-after-free in the JavaScript Engine component\n- CVE-2026-2764: JIT miscompilation, use-after-free in the JavaScript Engine:\n  JIT component\n- CVE-2026-2765: Use-after-free in the JavaScript Engine component\n- CVE-2026-2766: Use-after-free in the JavaScript Engine: JIT component\n- CVE-2026-2767: Use-after-free in the JavaScript: WebAssembly component\n- CVE-2026-2768: Sandbox escape in the Storage: IndexedDB component\n- CVE-2026-2769: Use-after-free in the Storage: IndexedDB component\n- CVE-2026-2770: Use-after-free in the DOM: Bindings (WebIDL) component\n- CVE-2026-2771: Undefined behavior in the DOM: Core & HTML component\n- CVE-2026-2772: Use-after-free in the Audio/Video: Playback component\n- CVE-2026-2773: Incorrect boundary conditions in the Web Audio component\n- CVE-2026-2774: Integer overflow in the Audio/Video component\n- CVE-2026-2775: Mitigation bypass in the DOM: HTML Parser component\n- CVE-2026-2776: Sandbox escape due to incorrect boundary conditions in the\n  Telemetry component in External Software\n- CVE-2026-2777: Privilege escalation in the Messaging System component\n- CVE-2026-2778: Sandbox escape due to incorrect boundary conditions in the\n  DOM: Core & HTML component\n- CVE-2026-2779: Incorrect boundary conditions in the Networking: JAR component\n- CVE-2026-2780: Privilege escalation in the Netmonitor component\n- CVE-2026-2781: Integer overflow in the Libraries component in NSS\n- CVE-2026-2782: Privilege escalation in the Netmonitor component\n- CVE-2026-2783: Information disclosure due to JIT miscompilation in the\n  JavaScript Engine: JIT component\n- CVE-2026-2784: Mitigation bypass in the DOM: Security component\n- CVE-2026-2785: Invalid pointer in the JavaScript Engine component\n- CVE-2026-2786: Use-after-free in the JavaScript Engine component\n- CVE-2026-2787: Use-after-free in the DOM: Window and Location component\n- CVE-2026-2788: Incorrect boundary conditions in the Audio/Video: GMP\n  component\n- CVE-2026-2789: Use-after-free in the Graphics: ImageLib component\n- CVE-2026-2790: Same-origin policy bypass in the Networking: JAR component\n- CVE-2026-2791: Mitigation bypass in the Networking: Cache component\n- CVE-2026-2792: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR\n  140.8, Firefox 148 and Thunderbird 148\n- CVE-2026-2793: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR\n  140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148\n","id":"SUSE-SU-2026:0880-1","modified":"2026-03-12T10:18:33Z","published":"2026-03-12T10:18:33Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-20260880-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1258568"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2757"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2758"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2759"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2760"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2761"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2762"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2763"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2764"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2765"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2766"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2767"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2768"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2769"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2770"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2771"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2772"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2773"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2774"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2775"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2776"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2777"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2778"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2779"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2780"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2781"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2782"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2783"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2784"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2785"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2786"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2787"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2788"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2789"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2790"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2791"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2792"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-2793"}],"related":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2776","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2780","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"],"summary":"Security update for MozillaThunderbird","upstream":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2776","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2780","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"]}