RLSA-2026:10766

Source
https://errata.rockylinux.org/RLSA-2026:10766
Import Source
https://storage.googleapis.com/resf-osv-data/RLSA-2026:10766.json
JSON Data
https://api.test.osv.dev/v1/vulns/RLSA-2026:10766
Upstream
  • CVE-2026-6746
  • CVE-2026-6747
  • CVE-2026-6748
  • CVE-2026-6749
  • CVE-2026-6750
  • CVE-2026-6751
  • CVE-2026-6752
  • CVE-2026-6753
  • CVE-2026-6754
  • CVE-2026-6757
  • CVE-2026-6759
  • CVE-2026-6761
  • CVE-2026-6762
  • CVE-2026-6763
  • CVE-2026-6764
  • CVE-2026-6765
  • CVE-2026-6766
  • CVE-2026-6767
  • CVE-2026-6769
  • CVE-2026-6770
  • CVE-2026-6771
  • CVE-2026-6772
  • CVE-2026-6776
  • CVE-2026-6785
  • CVE-2026-6786
Published
2026-04-30T18:01:05.380956Z
Modified
2026-04-30T18:29:52.103352Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Important: firefox security update
Details

Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.

Security Fix(es):

  • firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6772)

  • firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-6754)

  • firefox: thunderbird: Spoofing issue in the DOM: Core & HTML component (CVE-2026-6762)

  • firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6752)

  • firefox: thunderbird: Other issue in the Storage: IndexedDB component (CVE-2026-6770)

  • firefox: thunderbird: Invalid pointer in the JavaScript: WebAssembly component (CVE-2026-6757)

  • firefox: thunderbird: Other issue in the Libraries component in NSS (CVE-2026-6767)

  • firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6786)

  • firefox: thunderbird: Incorrect boundary conditions in the WebRTC component (CVE-2026-6753)

  • firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-6759)

  • firefox: thunderbird: Use-after-free in the WebRTC component (CVE-2026-6747)

  • firefox: thunderbird: Information disclosure due to uninitialized memory in the Graphics: Canvas2D component (CVE-2026-6749)

  • firefox: thunderbird: Incorrect boundary conditions in the Libraries component in NSS (CVE-2026-6766)

  • firefox: thunderbird: Privilege escalation in the Networking component (CVE-2026-6761)

  • firefox: thunderbird: Mitigation bypass in the File Handling component (CVE-2026-6763)

  • firefox: thunderbird: Privilege escalation in the Graphics: WebRender component (CVE-2026-6750)

  • firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6748)

  • firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150 (CVE-2026-6785)

  • firefox: thunderbird: Mitigation bypass in the DOM: Security component (CVE-2026-6771)

  • firefox: thunderbird: Incorrect boundary conditions in the DOM: Device Interfaces component (CVE-2026-6764)

  • firefox: thunderbird: Information disclosure in the Form Autofill component (CVE-2026-6765)

  • firefox: thunderbird: Privilege escalation in the Debugger component (CVE-2026-6769)

  • firefox: thunderbird: Uninitialized memory in the Audio/Video: Web Codecs component (CVE-2026-6751)

  • firefox: thunderbird: Incorrect boundary conditions in the WebRTC: Networking component (CVE-2026-6776)

  • firefox: thunderbird: Use-after-free in the DOM: Core & HTML component (CVE-2026-6746)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

References
Credits
    • Rocky Enterprise Software Foundation
    • Red Hat

Affected packages

Rocky Linux:8 / firefox

Package

Name
firefox
Purl
pkg:rpm/rocky-linux/firefox?distro=rocky-linux-8&epoch=0

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0:140.10.0-1.el8_10
Database specific
{
    "yum_repository": "AppStream"
}

Database specific

source
"https://storage.googleapis.com/resf-osv-data/RLSA-2026:10766.json"