[ALSA-2025:23035] Important: firefox security update
Type:
security
Severity:
important
Release date:
2025-12-12
Description:
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: Memory safety bugs fixed in Firefox ESR 140.6, Thunderbird ESR 140.6, Firefox 146 and Thunderbird 146 (CVE-2025-14333) * firefox: Use-after-free in the WebRTC: Signaling component (CVE-2025-14321) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14325) * firefox: Sandbox escape due to incorrect boundary conditions in the Graphics: CanvasWebGL component (CVE-2025-14322) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14328) * firefox: Privilege escalation in the Netmonitor component (CVE-2025-14329) * firefox: Same-origin policy bypass in the Request Handling component (CVE-2025-14331) * firefox: Privilege escalation in the DOM: Notifications component (CVE-2025-14323) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14330) * firefox: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2025-14324) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 firefox-140.6.0-1.el10_1.aarch64.rpm 5acd681a35151bb79043d52d45989fa7514a8b05d65a4137284ce7f73c522a32
ppc64le firefox-140.6.0-1.el10_1.ppc64le.rpm f2c31d14bbfef851678e333f0d3eed79f5d60ea1fa5b1c7bb39e6f21a637614a
s390x firefox-140.6.0-1.el10_1.s390x.rpm 0ac0d4e188b3403f1210addf3682f536360289bc344ab271d56604f0b66fd64d
x86_64 firefox-140.6.0-1.el10_1.x86_64.rpm c28271f2b923fe95bb4323d79be8333c6424de40f46b2cd7c6f2755f259b1173
x86_64_v2 firefox-140.6.0-1.el10_1.x86_64_v2.rpm 18aa6087adcdb1e3bc47fbce247c1a8be53bfd4aa8758fb6d7682ef527fc7abe
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.