RLSA-2026:3339

Source
https://errata.rockylinux.org/RLSA-2026:3339
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:3339.json
JSON Data
https://api.osv.dev/v1/vulns/RLSA-2026:3339
Upstream
  • CVE-2026-2447
  • CVE-2026-2757
  • CVE-2026-2758
  • CVE-2026-2759
  • CVE-2026-2760
  • CVE-2026-2761
  • CVE-2026-2762
  • CVE-2026-2763
  • CVE-2026-2764
  • CVE-2026-2765
  • CVE-2026-2766
  • CVE-2026-2767
  • CVE-2026-2768
  • CVE-2026-2769
  • CVE-2026-2770
  • CVE-2026-2771
  • CVE-2026-2772
  • CVE-2026-2773
  • CVE-2026-2774
  • CVE-2026-2775
  • CVE-2026-2776
  • CVE-2026-2777
  • CVE-2026-2778
  • CVE-2026-2779
  • CVE-2026-2780
  • CVE-2026-2781
  • CVE-2026-2782
  • CVE-2026-2783
  • CVE-2026-2784
  • CVE-2026-2785
  • CVE-2026-2786
  • CVE-2026-2787
  • CVE-2026-2788
  • CVE-2026-2789
  • CVE-2026-2790
  • CVE-2026-2791
  • CVE-2026-2792
  • CVE-2026-2793
Published
2026-02-26T20:45:27.603517Z
Modified
2026-02-26T21:36:29.246574Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)

  • firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785)

  • firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793)

  • firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771)

  • firefox: Integer overflow in the Audio/Video component (CVE-2026-2774)

  • firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776)

  • firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781)

  • firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766)

  • firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769)

  • firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787)

  • firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768)

  • firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783)

  • firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788)

  • firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784)

  • firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759)

  • firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762)

  • firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761)

  • firefox: Privilege escalation in the Messaging System component (CVE-2026-2777)

  • firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790)

  • firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775)

  • firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763)

  • firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792)

  • firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773)

  • firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786)

  • firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789)

  • firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757)

  • firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760)

  • firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772)

  • firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779)

  • firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767)

  • firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764)

  • firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782)

  • firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765)

  • firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780)

  • firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778)

  • firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758)

  • firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791)

  • firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:9 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-9&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:140.8.0-2.el9_7
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:3339.json"