Security update for MozillaFirefox
| Announcement ID: | SUSE-SU-2026:21383-1 |
|---|---|
| Release Date: | 2026-04-23T14:47:03Z |
| Rating: | important |
| References: | |
| Cross-References: |
|
| CVSS scores: |
|
| Affected Products: |
|
An update that solves 25 vulnerabilities can now be installed.
Description:
This update for MozillaFirefox fixes the following issues:
Update to Firefox Extended Support Release 140.10.0 ESR.
- MFSA 2026-32 (bsc#1262230):
- CVE-2026-6746: Use-after-free in the DOM: Core & HTML component
- CVE-2026-6747: Use-after-free in the WebRTC component
- CVE-2026-6748: Uninitialized memory in the Audio/Video: Web Codecs component
- CVE-2026-6749: Information disclosure due to uninitialized memory in the Graphics: Canvas2D component
- CVE-2026-6750: Privilege escalation in the Graphics: WebRender component
- CVE-2026-6751: Uninitialized memory in the Audio/Video: Web Codecs component
- CVE-2026-6752: Incorrect boundary conditions in the WebRTC component
- CVE-2026-6753: Incorrect boundary conditions in the WebRTC component
- CVE-2026-6754: Use-after-free in the JavaScript Engine component
- CVE-2026-6757: Invalid pointer in the JavaScript: WebAssembly component
- CVE-2026-6759: Use-after-free in the Widget: Cocoa component
- CVE-2026-6761: Privilege escalation in the Networking component
- CVE-2026-6762: Spoofing issue in the DOM: Core & HTML component
- CVE-2026-6763: Mitigation bypass in the File Handling component
- CVE-2026-6764: Incorrect boundary conditions in the DOM: Device Interfaces component
- CVE-2026-6765: Information disclosure in the Form Autofill component
- CVE-2026-6766: Incorrect boundary conditions in the Libraries component in NSS
- CVE-2026-6767: Other issue in the Libraries component in NSS
- CVE-2026-6769: Privilege escalation in the Debugger component
- CVE-2026-6770: Other issue in the Storage: IndexedDB component
- CVE-2026-6771: Mitigation bypass in the DOM: Security component
- CVE-2026-6772: Incorrect boundary conditions in the Libraries component in NSS
- CVE-2026-6776: Incorrect boundary conditions in the WebRTC: Networking component
- CVE-2026-6785: Memory safety bugs fixed in Firefox ESR 115.35, Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150
- CVE-2026-6786: Memory safety bugs fixed in Firefox ESR 140.10, Thunderbird ESR 140.10, Firefox 150 and Thunderbird 150
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Enterprise Server for SAP applications 16.0
zypper in -t patch SUSE-SLES-16.0-635=1 -
SUSE Linux Enterprise Server 16.0
zypper in -t patch SUSE-SLES-16.0-635=1
Package List:
-
SUSE Linux Enterprise Server for SAP applications 16.0 (ppc64le x86_64)
- MozillaFirefox-debuginfo-140.10.0-160000.1.1
- MozillaFirefox-translations-common-140.10.0-160000.1.1
- MozillaFirefox-140.10.0-160000.1.1
- MozillaFirefox-translations-other-140.10.0-160000.1.1
- MozillaFirefox-debugsource-140.10.0-160000.1.1
-
SUSE Linux Enterprise Server for SAP applications 16.0 (noarch)
- MozillaFirefox-devel-140.10.0-160000.1.1
-
SUSE Linux Enterprise Server 16.0 (aarch64 ppc64le s390x x86_64)
- MozillaFirefox-debuginfo-140.10.0-160000.1.1
- MozillaFirefox-translations-common-140.10.0-160000.1.1
- MozillaFirefox-140.10.0-160000.1.1
- MozillaFirefox-translations-other-140.10.0-160000.1.1
- MozillaFirefox-debugsource-140.10.0-160000.1.1
-
SUSE Linux Enterprise Server 16.0 (noarch)
- MozillaFirefox-devel-140.10.0-160000.1.1
References:
- https://www.suse.com/security/cve/CVE-2026-6746.html
- https://www.suse.com/security/cve/CVE-2026-6747.html
- https://www.suse.com/security/cve/CVE-2026-6748.html
- https://www.suse.com/security/cve/CVE-2026-6749.html
- https://www.suse.com/security/cve/CVE-2026-6750.html
- https://www.suse.com/security/cve/CVE-2026-6751.html
- https://www.suse.com/security/cve/CVE-2026-6752.html
- https://www.suse.com/security/cve/CVE-2026-6753.html
- https://www.suse.com/security/cve/CVE-2026-6754.html
- https://www.suse.com/security/cve/CVE-2026-6757.html
- https://www.suse.com/security/cve/CVE-2026-6759.html
- https://www.suse.com/security/cve/CVE-2026-6761.html
- https://www.suse.com/security/cve/CVE-2026-6762.html
- https://www.suse.com/security/cve/CVE-2026-6763.html
- https://www.suse.com/security/cve/CVE-2026-6764.html
- https://www.suse.com/security/cve/CVE-2026-6765.html
- https://www.suse.com/security/cve/CVE-2026-6766.html
- https://www.suse.com/security/cve/CVE-2026-6767.html
- https://www.suse.com/security/cve/CVE-2026-6769.html
- https://www.suse.com/security/cve/CVE-2026-6770.html
- https://www.suse.com/security/cve/CVE-2026-6771.html
- https://www.suse.com/security/cve/CVE-2026-6772.html
- https://www.suse.com/security/cve/CVE-2026-6776.html
- https://www.suse.com/security/cve/CVE-2026-6785.html
- https://www.suse.com/security/cve/CVE-2026-6786.html
- https://bugzilla.suse.com/show_bug.cgi?id=1262230