[Apollo] Advisories Statistics light light Login

RLSA-2026:3361

Security Mirrored from RHSA-2026:3361
Issued at: 2026-02-26
Updated at: 2026-02-26

Synopsis

Important: firefox security update



Description

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

* libvpx: Heap buffer overflow in libvpx (CVE-2026-2447)

* firefox: Invalid pointer in the JavaScript Engine component (CVE-2026-2785)

* firefox: Memory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2793)

* firefox: Undefined behavior in the DOM: Core & HTML component (CVE-2026-2771)

* firefox: Integer overflow in the Audio/Video component (CVE-2026-2774)

* firefox: Sandbox escape due to incorrect boundary conditions in the Telemetry component in External Software (CVE-2026-2776)

* firefox: Integer overflow in the Libraries component in NSS (CVE-2026-2781)

* firefox: Use-after-free in the JavaScript Engine: JIT component (CVE-2026-2766)

* firefox: Use-after-free in the Storage: IndexedDB component (CVE-2026-2769)

* firefox: Use-after-free in the DOM: Window and Location component (CVE-2026-2787)

* firefox: Sandbox escape in the Storage: IndexedDB component (CVE-2026-2768)

* firefox: Information disclosure due to JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-2783)

* firefox: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-2788)

* firefox: Mitigation bypass in the DOM: Security component (CVE-2026-2784)

* firefox: Incorrect boundary conditions in the Graphics: ImageLib component (CVE-2026-2759)

* firefox: Integer overflow in the JavaScript: Standard Library component (CVE-2026-2762)

* firefox: Sandbox escape in the Graphics: WebRender component (CVE-2026-2761)

* firefox: Privilege escalation in the Messaging System component (CVE-2026-2777)

* firefox: Same-origin policy bypass in the Networking: JAR component (CVE-2026-2790)

* firefox: Mitigation bypass in the DOM: HTML Parser component (CVE-2026-2775)

* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2763)

* firefox: Memory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148 (CVE-2026-2792)

* firefox: Incorrect boundary conditions in the Web Audio component (CVE-2026-2773)

* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2786)

* firefox: Use-after-free in the Graphics: ImageLib component (CVE-2026-2789)

* firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Audio/Video component (CVE-2026-2757)

* firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: WebRender component (CVE-2026-2760)

* firefox: Use-after-free in the Audio/Video: Playback component (CVE-2026-2772)

* firefox: Incorrect boundary conditions in the Networking: JAR component (CVE-2026-2779)

* firefox: Use-after-free in the JavaScript: WebAssembly component (CVE-2026-2767)

* firefox: JIT miscompilation, use-after-free in the JavaScript Engine: JIT component (CVE-2026-2764)

* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2782)

* firefox: Use-after-free in the JavaScript Engine component (CVE-2026-2765)

* firefox: Privilege escalation in the Netmonitor component (CVE-2026-2780)

* firefox: Sandbox escape due to incorrect boundary conditions in the DOM: Core & HTML component (CVE-2026-2778)

* firefox: Use-after-free in the JavaScript: GC component (CVE-2026-2758)

* firefox: Mitigation bypass in the Networking: Cache component (CVE-2026-2791)

* firefox: Use-after-free in the DOM: Bindings (WebIDL) component (CVE-2026-2770)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Affected products

Rocky Linux 10 aarch64 Rocky Linux 10 ppc64le Rocky Linux 10 s390x Rocky Linux 10 x86_64

Fixes

2442331 2442337 2442322 2442295 2442292 2442343 2442290 2442307 2442316 2442304 2442328 2442335 2442318 2442342 2442288 2442325 2442320 2442291 2442314 2442312 2442297 2442324 2442319 2442327 2442300 2442313 2442284 2442287 2442308 2442298 2442294 2440219 2442333 2442309 2442334 2442329 2442326 2442302

CVEs

CVE-2026-2447 CVE-2026-2757 CVE-2026-2758 CVE-2026-2759 CVE-2026-2760 CVE-2026-2761 CVE-2026-2762 CVE-2026-2763 CVE-2026-2764 CVE-2026-2765 CVE-2026-2766 CVE-2026-2767 CVE-2026-2768 CVE-2026-2769 CVE-2026-2770 CVE-2026-2771 CVE-2026-2772 CVE-2026-2773 CVE-2026-2774 CVE-2026-2775 CVE-2026-2776 CVE-2026-2777 CVE-2026-2778 CVE-2026-2779 CVE-2026-2780 CVE-2026-2781 CVE-2026-2782 CVE-2026-2783 CVE-2026-2784 CVE-2026-2785 CVE-2026-2786 CVE-2026-2787 CVE-2026-2788 CVE-2026-2789 CVE-2026-2790 CVE-2026-2791 CVE-2026-2792 CVE-2026-2793

Affected packages

Rocky Linux 10 s390x - AppStream

firefox-debuginfo-0:140.8.0-2.el10_1.s390x.rpm firefox-debugsource-0:140.8.0-2.el10_1.s390x.rpm firefox-0:140.8.0-2.el10_1.s390x.rpm firefox-0:140.8.0-2.el10_1.src.rpm

Rocky Linux 10 aarch64 - AppStream

firefox-0:140.8.0-2.el10_1.aarch64.rpm firefox-debugsource-0:140.8.0-2.el10_1.aarch64.rpm firefox-0:140.8.0-2.el10_1.src.rpm firefox-debuginfo-0:140.8.0-2.el10_1.aarch64.rpm

Rocky Linux 10 ppc64le - AppStream

firefox-debugsource-0:140.8.0-2.el10_1.ppc64le.rpm firefox-debuginfo-0:140.8.0-2.el10_1.ppc64le.rpm firefox-0:140.8.0-2.el10_1.src.rpm firefox-0:140.8.0-2.el10_1.ppc64le.rpm

Rocky Linux 10 x86_64 - AppStream

firefox-0:140.8.0-2.el10_1.src.rpm firefox-debugsource-0:140.8.0-2.el10_1.x86_64.rpm firefox-debuginfo-0:140.8.0-2.el10_1.x86_64.rpm firefox-0:140.8.0-2.el10_1.x86_64.rpm