{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaThunderbird fixes the following issues:\n\nChanges in MozillaThunderbird:\n\n- Mozilla Thunderbird 140.8.1 ESR\n * Add mail.openpgp.load_untested_gpgme_version to load untested\n GPGME version\n\n- Mozilla Thunderbird 140.8.0 ESR\n MFSA 2026-17 (boo#1258568)\n * CVE-2026-2757 (bmo#2001637)\n Incorrect boundary conditions in the WebRTC: Audio/Video\n component\n * CVE-2026-2758 (bmo#2009608)\n Use-after-free in the JavaScript: GC component\n * CVE-2026-2759 (bmo#2010933)\n Incorrect boundary conditions in the Graphics: ImageLib\n component\n * CVE-2026-2760 (bmo#2011062)\n Sandbox escape due to incorrect boundary conditions in the\n Graphics: WebRender component\n * CVE-2026-2761 (bmo#2011063)\n Sandbox escape in the Graphics: WebRender component\n * CVE-2026-2762 (bmo#2011649)\n Integer overflow in the JavaScript: Standard Library\n component\n * CVE-2026-2763 (bmo#2012018)\n Use-after-free in the JavaScript Engine component\n * CVE-2026-2764 (bmo#2012608)\n JIT miscompilation, use-after-free in the JavaScript Engine:\n JIT component\n * CVE-2026-2765 (bmo#2013562)\n Use-after-free in the JavaScript Engine component\n * CVE-2026-2766 (bmo#2013583)\n Use-after-free in the JavaScript Engine: JIT component\n * CVE-2026-2767 (bmo#2013741)\n Use-after-free in the JavaScript: WebAssembly component\n * CVE-2026-2768 (bmo#2014101)\n Sandbox escape in the Storage: IndexedDB component\n * CVE-2026-2769 (bmo#2014550)\n Use-after-free in the Storage: IndexedDB component\n * CVE-2026-2770 (bmo#2014585)\n Use-after-free in the DOM: Bindings (WebIDL) component\n * CVE-2026-2771 (bmo#2014593)\n Undefined behavior in the DOM: Core \u0026 HTML component\n * CVE-2026-2772 (bmo#2014827)\n Use-after-free in the Audio/Video: Playback component\n * CVE-2026-2773 (bmo#2014832)\n Incorrect boundary conditions in the Web Audio component\n * CVE-2026-2774 (bmo#2014883)\n Integer overflow in the Audio/Video component\n * CVE-2026-2775 (bmo#2015199)\n Mitigation bypass in the DOM: HTML Parser component\n * CVE-2026-2776 (bmo#2015266)\n Sandbox escape due to incorrect boundary conditions in the\n Telemetry component in External Software\n * CVE-2026-2777 (bmo#2015305)\n Privilege escalation in the Messaging System component\n * CVE-2026-2778 (bmo#2016358)\n Sandbox escape due to incorrect boundary conditions in the\n DOM: Core \u0026 HTML component\n * CVE-2026-2779 (bmo#1164141)\n Incorrect boundary conditions in the Networking: JAR\n component\n * CVE-2026-2780 (bmo#2007829)\n Privilege escalation in the Netmonitor component\n * CVE-2026-2781 (bmo#2009552)\n Integer overflow in the Libraries component in NSS\n * CVE-2026-2782 (bmo#2010743)\n Privilege escalation in the Netmonitor component\n * CVE-2026-2783 (bmo#2010943)\n Information disclosure due to JIT miscompilation in the\n JavaScript Engine: JIT component\n * CVE-2026-2784 (bmo#2012984)\n Mitigation bypass in the DOM: Security component\n * CVE-2026-2785 (bmo#2013549)\n Invalid pointer in the JavaScript Engine component\n * CVE-2026-2786 (bmo#2013612)\n Use-after-free in the JavaScript Engine component\n * CVE-2026-2787 (bmo#2014560)\n Use-after-free in the DOM: Window and Location component\n * CVE-2026-2788 (bmo#2014824)\n Incorrect boundary conditions in the Audio/Video: GMP\n component\n * CVE-2026-2789 (bmo#2015179)\n Use-after-free in the Graphics: ImageLib component\n * CVE-2026-2790 (bmo#2008426)\n Same-origin policy bypass in the Networking: JAR component\n * CVE-2026-2791 (bmo#2015220)\n Mitigation bypass in the Networking: Cache component\n * CVE-2026-2792 (bmo#2008912, bmo#2010050, bmo#2010275,\n bmo#2012331)\n Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird\n ESR 140.8, Firefox 148 and Thunderbird 148\n * CVE-2026-2793 (bmo#2015196, bmo#2016423, bmo#2016498)\n Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR\n 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148\n\n- Mozilla Thunderbird 140.7.2 ESR\n MFSA 2026-11 (boo#1258231)\n * CVE-2026-2447 (bmo#2014390)\n Heap buffer overflow in libvpx\n\n- Mozilla Thunderbird 140.7.1 ESR\n MFSA 2026-08 (bsc#1257397)\n * CVE-2026-0818 (bmo#1881530)\n CSS-based exfiltration of the content from partially\n encrypted emails when allowing remote content\n\n- Support using system GnuPG with gpgme 2, boo#1253718\n\n- Mozilla Thunderbird 140.7.0 ESR\n MFSA 2026-05 (bsc#1256340)\n * CVE-2026-0877 (bmo#1999257)\n Mitigation bypass in the DOM: Security component\n * CVE-2026-0878 (bmo#2003989)\n Sandbox escape due to incorrect boundary conditions in the\n Graphics: CanvasWebGL component\n * CVE-2026-0879 (bmo#2004602)\n Sandbox escape due to incorrect boundary conditions in the\n Graphics component\n * CVE-2026-0880 (bmo#2005014)\n Sandbox escape due to integer overflow in the Graphics\n component\n * CVE-2026-0882 (bmo#1924125)\n Use-after-free in the IPC component\n * CVE-2025-14327 (bmo#1970743)\n Spoofing issue in the Downloads Panel component\n * CVE-2026-0883 (bmo#1989340)\n Information disclosure in the Networking component\n * CVE-2026-0884 (bmo#2003588)\n Use-after-free in the JavaScript Engine component\n * CVE-2026-0885 (bmo#2003607)\n Use-after-free in the JavaScript: GC component\n * CVE-2026-0886 (bmo#2005658)\n Incorrect boundary conditions in the Graphics component\n * CVE-2026-0887 (bmo#2006500)\n Clickjacking issue, information disclosure in the PDF Viewer\n component\n * CVE-2026-0890 (bmo#2005081)\n Spoofing issue in the DOM: Copy \u0026 Paste and Drag \u0026 Drop\n component\n * CVE-2026-0891 (bmo#1964722, bmo#2000981, bmo#2003100,\n bmo#2003278)\n Memory safety bugs fixed in Firefox ESR 140.7, Thunderbird\n ESR 140.7, Firefox 147 and Thunderbird 147\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-170",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20391-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1253718",
"url": "https://bugzilla.suse.com/1253718"
},
{
"category": "self",
"summary": "SUSE Bug 1256340",
"url": "https://bugzilla.suse.com/1256340"
},
{
"category": "self",
"summary": "SUSE Bug 1257397",
"url": "https://bugzilla.suse.com/1257397"
},
{
"category": "self",
"summary": "SUSE Bug 1258231",
"url": "https://bugzilla.suse.com/1258231"
},
{
"category": "self",
"summary": "SUSE Bug 1258568",
"url": "https://bugzilla.suse.com/1258568"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-14327 page",
"url": "https://www.suse.com/security/cve/CVE-2025-14327/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0818 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0818/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0877 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0877/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0878 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0878/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0879 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0879/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0880 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0880/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0882 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0882/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0883 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0883/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0884 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0884/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0885 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0885/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0886 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0886/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0887 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0887/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0890 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0890/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-0891 page",
"url": "https://www.suse.com/security/cve/CVE-2026-0891/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2447 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2447/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2757 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2757/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2758 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2758/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2759 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2759/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2760 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2760/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2761 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2761/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2762 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2762/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2763 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2763/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2764 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2764/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2765 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2765/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2766 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2766/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2767 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2767/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2768 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2769 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2769/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2770 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2770/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2771 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2771/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2772 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2772/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2773 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2773/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2774 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2774/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2775 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2775/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2776 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2776/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2777 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2777/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2778 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2778/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2779 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2779/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2780 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2780/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2781 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2781/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2782 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2782/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2783 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2783/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2784 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2784/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2785 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2785/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2786 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2786/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2787 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2787/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2788 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2788/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2789 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2789/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2790 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2790/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2791 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2791/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2792 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2792/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2026-2793 page",
"url": "https://www.suse.com/security/cve/CVE-2026-2793/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2026-03-18T13:37:38Z",
"generator": {
"date": "2026-03-18T13:37:38Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20391-1",
"initial_release_date": "2026-03-18T13:37:38Z",
"revision_history": [
{
"date": "2026-03-18T13:37:38Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"product": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"product_id": "MozillaThunderbird-140.8.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"product": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"product_id": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"product_id": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"product_id": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"product_id": "MozillaThunderbird-140.8.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"product_id": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"product": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"product_id": "MozillaThunderbird-140.8.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"product": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"product_id": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"product_id": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"product_id": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"product": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"product_id": "MozillaThunderbird-140.8.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"product": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"product_id": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64"
},
"product_reference": "MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x"
},
"product_reference": "MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-140.8.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64"
},
"product_reference": "MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64"
},
"product_reference": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x"
},
"product_reference": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64"
},
"product_reference": "MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-14327"
}
],
"notes": [
{
"category": "general",
"text": "Spoofing issue in the Downloads Panel component. This vulnerability affects Firefox \u003c 146, Thunderbird \u003c 146, Firefox ESR \u003c 140.7, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-14327",
"url": "https://www.suse.com/security/cve/CVE-2025-14327"
},
{
"category": "external",
"summary": "SUSE Bug 1254551 for CVE-2025-14327",
"url": "https://bugzilla.suse.com/1254551"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2025-14327"
},
{
"cve": "CVE-2026-0818",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0818"
}
],
"notes": [
{
"category": "general",
"text": "When a user explicitly requested Thunderbird to decrypt an inline OpenPGP message that was embedded in a text section of an email that was formatted and styled with HTML and CSS, then the decrypted contents were rendered in a context in which the CSS styles from the outer messages were active. If the user had additionally allowed loading of the remote content referenced by the outer email message, and the email was crafted by the sender using a combination of CSS rules and fonts and animations, then it was possible to extract the secret contents of the email. This vulnerability affects Thunderbird \u003c 147.0.1 and Thunderbird \u003c 140.7.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0818",
"url": "https://www.suse.com/security/cve/CVE-2026-0818"
},
{
"category": "external",
"summary": "SUSE Bug 1257397 for CVE-2026-0818",
"url": "https://bugzilla.suse.com/1257397"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.1,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "moderate"
}
],
"title": "CVE-2026-0818"
},
{
"cve": "CVE-2026-0877",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0877"
}
],
"notes": [
{
"category": "general",
"text": "Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 115.32, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0877",
"url": "https://www.suse.com/security/cve/CVE-2026-0877"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0877",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0877"
},
{
"cve": "CVE-2026-0878",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0878"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0878",
"url": "https://www.suse.com/security/cve/CVE-2026-0878"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0878",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0878"
},
{
"cve": "CVE-2026-0879",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0879"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 115.32, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0879",
"url": "https://www.suse.com/security/cve/CVE-2026-0879"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0879",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0879"
},
{
"cve": "CVE-2026-0880",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0880"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to integer overflow in the Graphics component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 115.32, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0880",
"url": "https://www.suse.com/security/cve/CVE-2026-0880"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0880",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0880"
},
{
"cve": "CVE-2026-0882",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0882"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the IPC component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 115.32, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0882",
"url": "https://www.suse.com/security/cve/CVE-2026-0882"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0882",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0882"
},
{
"cve": "CVE-2026-0883",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0883"
}
],
"notes": [
{
"category": "general",
"text": "Information disclosure in the Networking component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0883",
"url": "https://www.suse.com/security/cve/CVE-2026-0883"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0883",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0883"
},
{
"cve": "CVE-2026-0884",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0884"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0884",
"url": "https://www.suse.com/security/cve/CVE-2026-0884"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0884",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0884"
},
{
"cve": "CVE-2026-0885",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0885"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0885",
"url": "https://www.suse.com/security/cve/CVE-2026-0885"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0885",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0885"
},
{
"cve": "CVE-2026-0886",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0886"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the Graphics component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 115.32, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0886",
"url": "https://www.suse.com/security/cve/CVE-2026-0886"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0886",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0886"
},
{
"cve": "CVE-2026-0887",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0887"
}
],
"notes": [
{
"category": "general",
"text": "Clickjacking issue, information disclosure in the PDF Viewer component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0887",
"url": "https://www.suse.com/security/cve/CVE-2026-0887"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0887",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0887"
},
{
"cve": "CVE-2026-0890",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0890"
}
],
"notes": [
{
"category": "general",
"text": "Spoofing issue in the DOM: Copy \u0026 Paste and Drag \u0026 Drop component. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0890",
"url": "https://www.suse.com/security/cve/CVE-2026-0890"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0890",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0890"
},
{
"cve": "CVE-2026-0891",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-0891"
}
],
"notes": [
{
"category": "general",
"text": "Memory safety bugs present in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 147, Firefox ESR \u003c 140.7, Thunderbird \u003c 147, and Thunderbird \u003c 140.7.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-0891",
"url": "https://www.suse.com/security/cve/CVE-2026-0891"
},
{
"category": "external",
"summary": "SUSE Bug 1256340 for CVE-2026-0891",
"url": "https://bugzilla.suse.com/1256340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-0891"
},
{
"cve": "CVE-2026-2447",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2447"
}
],
"notes": [
{
"category": "general",
"text": "Heap buffer overflow in libvpx. This vulnerability affects Firefox \u003c 147.0.4, Firefox ESR \u003c 140.7.1, Firefox ESR \u003c 115.32.1, Thunderbird \u003c 140.7.2, and Thunderbird \u003c 147.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2447",
"url": "https://www.suse.com/security/cve/CVE-2026-2447"
},
{
"category": "external",
"summary": "SUSE Bug 1258388 for CVE-2026-2447",
"url": "https://bugzilla.suse.com/1258388"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2447"
},
{
"cve": "CVE-2026-2757",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2757"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the WebRTC: Audio/Video component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2757",
"url": "https://www.suse.com/security/cve/CVE-2026-2757"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2757",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2757"
},
{
"cve": "CVE-2026-2758",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2758"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript: GC component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2758",
"url": "https://www.suse.com/security/cve/CVE-2026-2758"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2758",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2758"
},
{
"cve": "CVE-2026-2759",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2759"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the Graphics: ImageLib component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2759",
"url": "https://www.suse.com/security/cve/CVE-2026-2759"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2759",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2759"
},
{
"cve": "CVE-2026-2760",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2760"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2760",
"url": "https://www.suse.com/security/cve/CVE-2026-2760"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2760",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2760"
},
{
"cve": "CVE-2026-2761",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2761"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape in the Graphics: WebRender component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2761",
"url": "https://www.suse.com/security/cve/CVE-2026-2761"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2761",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2761"
},
{
"cve": "CVE-2026-2762",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2762"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the JavaScript: Standard Library component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2762",
"url": "https://www.suse.com/security/cve/CVE-2026-2762"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2762",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2762"
},
{
"cve": "CVE-2026-2763",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2763"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2763",
"url": "https://www.suse.com/security/cve/CVE-2026-2763"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2763",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2763"
},
{
"cve": "CVE-2026-2764",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2764"
}
],
"notes": [
{
"category": "general",
"text": "JIT miscompilation, use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2764",
"url": "https://www.suse.com/security/cve/CVE-2026-2764"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2764",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2764"
},
{
"cve": "CVE-2026-2765",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2765"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2765",
"url": "https://www.suse.com/security/cve/CVE-2026-2765"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2765",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2765"
},
{
"cve": "CVE-2026-2766",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2766"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript Engine: JIT component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2766",
"url": "https://www.suse.com/security/cve/CVE-2026-2766"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2766",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2766"
},
{
"cve": "CVE-2026-2767",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2767"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript: WebAssembly component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2767",
"url": "https://www.suse.com/security/cve/CVE-2026-2767"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2767",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2767"
},
{
"cve": "CVE-2026-2768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2768"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape in the Storage: IndexedDB component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2768",
"url": "https://www.suse.com/security/cve/CVE-2026-2768"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2768",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2768"
},
{
"cve": "CVE-2026-2769",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2769"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the Storage: IndexedDB component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2769",
"url": "https://www.suse.com/security/cve/CVE-2026-2769"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2769",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2769"
},
{
"cve": "CVE-2026-2770",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2770"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the DOM: Bindings (WebIDL) component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2770",
"url": "https://www.suse.com/security/cve/CVE-2026-2770"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2770",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2770"
},
{
"cve": "CVE-2026-2771",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2771"
}
],
"notes": [
{
"category": "general",
"text": "Undefined behavior in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2771",
"url": "https://www.suse.com/security/cve/CVE-2026-2771"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2771",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2771"
},
{
"cve": "CVE-2026-2772",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2772"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the Audio/Video: Playback component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2772",
"url": "https://www.suse.com/security/cve/CVE-2026-2772"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2772",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2772"
},
{
"cve": "CVE-2026-2773",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2773"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the Web Audio component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2773",
"url": "https://www.suse.com/security/cve/CVE-2026-2773"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2773",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2773"
},
{
"cve": "CVE-2026-2774",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2774"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the Audio/Video component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2774",
"url": "https://www.suse.com/security/cve/CVE-2026-2774"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2774",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2774"
},
{
"cve": "CVE-2026-2775",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2775"
}
],
"notes": [
{
"category": "general",
"text": "Mitigation bypass in the DOM: HTML Parser component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2775",
"url": "https://www.suse.com/security/cve/CVE-2026-2775"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2775",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2775"
},
{
"cve": "CVE-2026-2776",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2776"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2776",
"url": "https://www.suse.com/security/cve/CVE-2026-2776"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2776",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2776"
},
{
"cve": "CVE-2026-2777",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2777"
}
],
"notes": [
{
"category": "general",
"text": "Privilege escalation in the Messaging System component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2777",
"url": "https://www.suse.com/security/cve/CVE-2026-2777"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2777",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2777"
},
{
"cve": "CVE-2026-2778",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2778"
}
],
"notes": [
{
"category": "general",
"text": "Sandbox escape due to incorrect boundary conditions in the DOM: Core \u0026 HTML component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2778",
"url": "https://www.suse.com/security/cve/CVE-2026-2778"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2778",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2778"
},
{
"cve": "CVE-2026-2779",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2779"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2779",
"url": "https://www.suse.com/security/cve/CVE-2026-2779"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2779",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2779"
},
{
"cve": "CVE-2026-2780",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2780"
}
],
"notes": [
{
"category": "general",
"text": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2780",
"url": "https://www.suse.com/security/cve/CVE-2026-2780"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2780",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2780"
},
{
"cve": "CVE-2026-2781",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2781"
}
],
"notes": [
{
"category": "general",
"text": "Integer overflow in the Libraries component in NSS. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2781",
"url": "https://www.suse.com/security/cve/CVE-2026-2781"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2781",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2781"
},
{
"cve": "CVE-2026-2782",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2782"
}
],
"notes": [
{
"category": "general",
"text": "Privilege escalation in the Netmonitor component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2782",
"url": "https://www.suse.com/security/cve/CVE-2026-2782"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2782",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2782"
},
{
"cve": "CVE-2026-2783",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2783"
}
],
"notes": [
{
"category": "general",
"text": "Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2783",
"url": "https://www.suse.com/security/cve/CVE-2026-2783"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2783",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2783"
},
{
"cve": "CVE-2026-2784",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2784"
}
],
"notes": [
{
"category": "general",
"text": "Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2784",
"url": "https://www.suse.com/security/cve/CVE-2026-2784"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2784",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2784"
},
{
"cve": "CVE-2026-2785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2785"
}
],
"notes": [
{
"category": "general",
"text": "Invalid pointer in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2785",
"url": "https://www.suse.com/security/cve/CVE-2026-2785"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2785",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2785"
},
{
"cve": "CVE-2026-2786",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2786"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the JavaScript Engine component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2786",
"url": "https://www.suse.com/security/cve/CVE-2026-2786"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2786",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2786"
},
{
"cve": "CVE-2026-2787",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2787"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the DOM: Window and Location component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2787",
"url": "https://www.suse.com/security/cve/CVE-2026-2787"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2787",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2787"
},
{
"cve": "CVE-2026-2788",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2788"
}
],
"notes": [
{
"category": "general",
"text": "Incorrect boundary conditions in the Audio/Video: GMP component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2788",
"url": "https://www.suse.com/security/cve/CVE-2026-2788"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2788",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2788"
},
{
"cve": "CVE-2026-2789",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2789"
}
],
"notes": [
{
"category": "general",
"text": "Use-after-free in the Graphics: ImageLib component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2789",
"url": "https://www.suse.com/security/cve/CVE-2026-2789"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2789",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2789"
},
{
"cve": "CVE-2026-2790",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2790"
}
],
"notes": [
{
"category": "general",
"text": "Same-origin policy bypass in the Networking: JAR component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2790",
"url": "https://www.suse.com/security/cve/CVE-2026-2790"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2790",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2790"
},
{
"cve": "CVE-2026-2791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2791"
}
],
"notes": [
{
"category": "general",
"text": "Mitigation bypass in the Networking: Cache component. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2791",
"url": "https://www.suse.com/security/cve/CVE-2026-2791"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2791",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2791"
},
{
"cve": "CVE-2026-2792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2792"
}
],
"notes": [
{
"category": "general",
"text": "Memory safety bugs present in Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2792",
"url": "https://www.suse.com/security/cve/CVE-2026-2792"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2792",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2792"
},
{
"cve": "CVE-2026-2793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2026-2793"
}
],
"notes": [
{
"category": "general",
"text": "Memory safety bugs present in Firefox ESR 115.32, Firefox ESR 140.7, Thunderbird ESR 140.7, Firefox 147 and Thunderbird 147. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 148, Firefox ESR \u003c 115.33, Firefox ESR \u003c 140.8, Thunderbird \u003c 148, and Thunderbird \u003c 140.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2026-2793",
"url": "https://www.suse.com/security/cve/CVE-2026-2793"
},
{
"category": "external",
"summary": "SUSE Bug 1258568 for CVE-2026-2793",
"url": "https://bugzilla.suse.com/1258568"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-openpgp-librnp-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-common-140.8.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:MozillaThunderbird-translations-other-140.8.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-18T13:37:38Z",
"details": "important"
}
],
"title": "CVE-2026-2793"
}
]
}