{"id":"MGASA-2026-0052","summary":"Updated rootcerts, nss & firefox packages fix security vulnerabilities","details":"Incorrect boundary conditions in the WebRTC: Audio/Video component.\n(CVE-2026-2757)\nUse-after-free in the JavaScript: GC component. (CVE-2026-2758)\nIncorrect boundary conditions in the Graphics: ImageLib component.\n(CVE-2026-2759)\nSandbox escape due to incorrect boundary conditions in the Graphics:\nWebRender component. (CVE-2026-2760)\nSandbox escape in the Graphics: WebRender component. (CVE-2026-2761)\nInteger overflow in the JavaScript: Standard Library component.\n(CVE-2026-2762)\nUse-after-free in the JavaScript Engine component. (CVE-2026-2763)\nJIT miscompilation, use-after-free in the JavaScript Engine: JIT\ncomponent. (CVE-2026-2764)\nUse-after-free in the JavaScript Engine component. (CVE-2026-2765)\nUse-after-free in the JavaScript Engine: JIT component. (CVE-2026-2766)\nUse-after-free in the JavaScript: WebAssembly component. (CVE-2026-2767)\nSandbox escape in the Storage: IndexedDB component. (CVE-2026-2768)\nUse-after-free in the Storage: IndexedDB component. (CVE-2026-2769)\nUse-after-free in the DOM: Bindings (WebIDL) component. (CVE-2026-2770)\nUndefined behavior in the DOM: Core & HTML component. (CVE-2026-2771)\nUse-after-free in the Audio/Video: Playback component. (CVE-2026-2772)\nIncorrect boundary conditions in the Web Audio component.\n(CVE-2026-2773)\nInteger overflow in the Audio/Video component. (CVE-2026-2774)\nMitigation bypass in the DOM: HTML Parser component. (CVE-2026-2775)\nSandbox escape due to incorrect boundary conditions in the Telemetry\ncomponent in External Software. (CVE-2026-2776)\nPrivilege escalation in the Messaging System component. (CVE-2026-2777)\nSandbox escape due to incorrect boundary conditions in the DOM: Core &\nHTML component. (CVE-2026-2778)\nIncorrect boundary conditions in the Networking: JAR component.\n(CVE-2026-2779)\nPrivilege escalation in the Netmonitor component. (CVE-2026-2780)\nInteger overflow in the Libraries component in NSS. (CVE-2026-2781)\nPrivilege escalation in the Netmonitor component. (CVE-2026-2782)\nInformation disclosure due to JIT miscompilation in the JavaScript\nEngine: JIT component. (CVE-2026-2783)\nMitigation bypass in the DOM: Security component. (CVE-2026-2784)\nInvalid pointer in the JavaScript Engine component. (CVE-2026-2785)\nUse-after-free in the JavaScript Engine component. (CVE-2026-2786)\nUse-after-free in the DOM: Window and Location component.\n(CVE-2026-2787)\nIncorrect boundary conditions in the Audio/Video: GMP component.\n(CVE-2026-2788)\nUse-after-free in the Graphics: ImageLib component. (CVE-2026-2789)\nSame-origin policy bypass in the Networking: JAR component.\n(CVE-2026-2790)\nMitigation bypass in the Networking: Cache component. (CVE-2026-2791)\nMemory safety bugs fixed in Firefox ESR 140.8, Thunderbird ESR 140.8,\nFirefox 148 and Thunderbird 148. (CVE-2026-2792)\nMemory safety bugs fixed in Firefox ESR 115.33, Firefox ESR 140.8,\nThunderbird ESR 140.8, Firefox 148 and Thunderbird 148. (CVE-2026-2793)\n","modified":"2026-04-16T00:11:01.196296452Z","published":"2026-03-09T17:48:59Z","upstream":["CVE-2026-2757","CVE-2026-2758","CVE-2026-2759","CVE-2026-2760","CVE-2026-2761","CVE-2026-2762","CVE-2026-2763","CVE-2026-2764","CVE-2026-2765","CVE-2026-2766","CVE-2026-2767","CVE-2026-2768","CVE-2026-2769","CVE-2026-2770","CVE-2026-2771","CVE-2026-2772","CVE-2026-2773","CVE-2026-2774","CVE-2026-2775","CVE-2026-2776","CVE-2026-2777","CVE-2026-2778","CVE-2026-2779","CVE-2026-2780","CVE-2026-2781","CVE-2026-2782","CVE-2026-2783","CVE-2026-2784","CVE-2026-2785","CVE-2026-2786","CVE-2026-2787","CVE-2026-2788","CVE-2026-2789","CVE-2026-2790","CVE-2026-2791","CVE-2026-2792","CVE-2026-2793"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2026-0052.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=35165"},{"type":"WEB","url":"https://firefox-source-docs.mozilla.org/security/nss/releases/nss_3_121.html"},{"type":"WEB","url":"https://www.firefox.com/en-US/firefox/140.8.0/releasenotes/"},{"type":"ADVISORY","url":"https://www.mozilla.org/en-US/security/advisories/mfsa2026-15/"}],"affected":[{"package":{"name":"rootcerts","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/rootcerts?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"20260206.00-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0052.json"}},{"package":{"name":"nss","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/nss?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"3.121.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0052.json"}},{"package":{"name":"firefox","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.8.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0052.json"}},{"package":{"name":"firefox-l10n","ecosystem":"Mageia:9","purl":"pkg:rpm/mageia/firefox-l10n?arch=source&distro=mageia-9"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"140.8.0-1.mga9"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2026-0052.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}