{"id":"ALSA-2026:0694","summary":"Important: firefox security update","details":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.  \n\nSecurity Fix(es):  \n\n  * firefox: Spoofing issue in the Downloads Panel component (CVE-2025-14327)\n  * firefox: Use-after-free in the JavaScript: GC component (CVE-2026-0885)\n  * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147 (CVE-2026-0891)\n  * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2026-0878)\n  * firefox: Use-after-free in the IPC component (CVE-2026-0882)\n  * firefox: Use-after-free in the JavaScript Engine component (CVE-2026-0884)\n  * firefox: Information disclosure in the Networking component (CVE-2026-0883)\n  * firefox: Mitigation bypass in the DOM: Security component (CVE-2026-0877)\n  * firefox: Spoofing issue in the DOM: Copy & Paste and Drag & Drop component (CVE-2026-0890)\n  * firefox: Clickjacking issue, information disclosure in the PDF Viewer component (CVE-2026-0887)\n  * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics component (CVE-2026-0879)\n  * firefox: Sandbox escape due to integer overflow in the Graphics component (CVE-2026-0880)\n  * firefox: Incorrect boundary conditions in the Graphics component (CVE-2026-0886)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n","modified":"2026-01-30T00:32:04.417419Z","published":"2026-01-15T00:00:00Z","related":["CVE-2025-14327","CVE-2026-0877","CVE-2026-0878","CVE-2026-0879","CVE-2026-0880","CVE-2026-0882","CVE-2026-0883","CVE-2026-0884","CVE-2026-0885","CVE-2026-0886","CVE-2026-0887","CVE-2026-0890","CVE-2026-0891"],"references":[{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2026:0694"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2025-14327"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0877"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0878"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0879"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0880"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0882"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0883"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0884"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0885"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0886"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0887"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0890"},{"type":"REPORT","url":"https://access.redhat.com/security/cve/CVE-2026-0891"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2420507"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428961"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428963"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428965"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428966"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428967"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428968"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428969"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428971"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428972"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428973"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428975"},{"type":"REPORT","url":"https://bugzilla.redhat.com/2428978"},{"type":"ADVISORY","url":"https://errata.almalinux.org/9/ALSA-2026-0694.html"}],"affected":[{"package":{"name":"firefox","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/firefox"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.7.0-1.el9_7.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2026:0694.json"}},{"package":{"name":"firefox-x11","ecosystem":"AlmaLinux:9","purl":"pkg:rpm/almalinux/firefox-x11"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.7.0-1.el9_7.alma.1"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux9/ALSA-2026:0694.json"}}],"schema_version":"1.7.3"}