SUSE SLES12 Security Update : MozillaFirefox (SUSE-SU-2026:1127-1)

critical Nessus Plugin ID 304234

Synopsis

The remote SUSE host is missing one or more security updates.

Description

The remote SUSE Linux SLES12 host has packages installed that are affected by multiple vulnerabilities as referenced in the SUSE-SU-2026:1127-1 advisory.

Update to Firefox 140.9.0 ESR (MFSA 2026-22, bsc#1260083):

- CVE-2026-4684: Race condition, use-after-free in the Graphics: WebRender component
- CVE-2026-4685: Incorrect boundary conditions in the Graphics: Canvas2D component
- CVE-2026-4686: Incorrect boundary conditions in the Graphics: Canvas2D component
- CVE-2026-4687: Sandbox escape due to incorrect boundary conditions in the Telemetry component
- CVE-2026-4688: Sandbox escape due to use-after-free in the Disability Access APIs component
- CVE-2026-4689: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
- CVE-2026-4690: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
- CVE-2026-4691: Use-after-free in the CSS Parsing and Computation component
- CVE-2026-4692: Sandbox escape in the Responsive Design Mode component
- CVE-2026-4693: Incorrect boundary conditions in the Audio/Video: Playback component
- CVE-2026-4694: Incorrect boundary conditions, integer overflow in the Graphics component
- CVE-2026-4695: Incorrect boundary conditions in the Audio/Video: Web Codecs component
- CVE-2026-4696: Use-after-free in the Layout: Text and Fonts component
- CVE-2026-4697: Incorrect boundary conditions in the Audio/Video: Web Codecs component
- CVE-2026-4698: JIT miscompilation in the JavaScript Engine: JIT component
- CVE-2026-4699: Incorrect boundary conditions in the Layout: Text and Fonts component
- CVE-2026-4700: Mitigation bypass in the Networking: HTTP component
- CVE-2026-4701: Use-after-free in the JavaScript Engine component
- CVE-2026-4702: JIT miscompilation in the JavaScript Engine component
- CVE-2026-4704: Denial-of-service in the WebRTC: Signaling component
- CVE-2026-4705: Undefined behavior in the WebRTC: Signaling component
- CVE-2026-4706: Incorrect boundary conditions in the Graphics: Canvas2D component
- CVE-2026-4707: Incorrect boundary conditions in the Graphics: Canvas2D component
- CVE-2026-4708: Incorrect boundary conditions in the Graphics component
- CVE-2026-4709: Incorrect boundary conditions in the Audio/Video: GMP component
- CVE-2026-4710: Incorrect boundary conditions in the Audio/Video component
- CVE-2026-4711: Use-after-free in the Widget: Cocoa component
- CVE-2026-4712: Information disclosure in the Widget: Cocoa component
- CVE-2026-4713: Incorrect boundary conditions in the Graphics component
- CVE-2026-4714: Incorrect boundary conditions in the Audio/Video component
- CVE-2026-4715: Uninitialized memory in the Graphics: Canvas2D component
- CVE-2026-4716: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component
- CVE-2026-4717: Privilege escalation in the Netmonitor component
- CVE-2025-59375: Denial-of-service in the XML component
- CVE-2026-4718: Undefined behavior in the WebRTC: Signaling component
- CVE-2026-4719: Incorrect boundary conditions in the Graphics: Text component
- CVE-2026-4720: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149
- CVE-2026-4721: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149

Tenable has extracted the preceding description block directly from the SUSE security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected MozillaFirefox, MozillaFirefox-devel and / or MozillaFirefox-translations-common packages.

See Also

https://bugzilla.suse.com/1260083

http://www.nessus.org/u?94cf52ee

https://www.suse.com/security/cve/CVE-2025-59375

https://www.suse.com/security/cve/CVE-2026-4684

https://www.suse.com/security/cve/CVE-2026-4685

https://www.suse.com/security/cve/CVE-2026-4686

https://www.suse.com/security/cve/CVE-2026-4687

https://www.suse.com/security/cve/CVE-2026-4688

https://www.suse.com/security/cve/CVE-2026-4689

https://www.suse.com/security/cve/CVE-2026-4690

https://www.suse.com/security/cve/CVE-2026-4691

https://www.suse.com/security/cve/CVE-2026-4692

https://www.suse.com/security/cve/CVE-2026-4693

https://www.suse.com/security/cve/CVE-2026-4694

https://www.suse.com/security/cve/CVE-2026-4695

https://www.suse.com/security/cve/CVE-2026-4696

https://www.suse.com/security/cve/CVE-2026-4697

https://www.suse.com/security/cve/CVE-2026-4698

https://www.suse.com/security/cve/CVE-2026-4699

https://www.suse.com/security/cve/CVE-2026-4700

https://www.suse.com/security/cve/CVE-2026-4701

https://www.suse.com/security/cve/CVE-2026-4702

https://www.suse.com/security/cve/CVE-2026-4704

https://www.suse.com/security/cve/CVE-2026-4705

https://www.suse.com/security/cve/CVE-2026-4706

https://www.suse.com/security/cve/CVE-2026-4707

https://www.suse.com/security/cve/CVE-2026-4708

https://www.suse.com/security/cve/CVE-2026-4709

https://www.suse.com/security/cve/CVE-2026-4710

https://www.suse.com/security/cve/CVE-2026-4711

https://www.suse.com/security/cve/CVE-2026-4712

https://www.suse.com/security/cve/CVE-2026-4713

https://www.suse.com/security/cve/CVE-2026-4714

https://www.suse.com/security/cve/CVE-2026-4715

https://www.suse.com/security/cve/CVE-2026-4716

https://www.suse.com/security/cve/CVE-2026-4717

https://www.suse.com/security/cve/CVE-2026-4718

https://www.suse.com/security/cve/CVE-2026-4719

https://www.suse.com/security/cve/CVE-2026-4720

https://www.suse.com/security/cve/CVE-2026-4721

Plugin Details

Severity: Critical

ID: 304234

File Name: suse_SU-2026-1127-1.nasl

Version: 1.1

Type: local

Agent: unix

Published: 3/29/2026

Updated: 3/29/2026

Supported Sensors: Continuous Assessment, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 8.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2026-4717

CVSS v3

Risk Factor: Critical

Base Score: 10

Temporal Score: 9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

CVSS Score Source: CVE-2026-4692

Vulnerability Information

CPE: cpe:/o:novell:suse_linux:12, p-cpe:/a:novell:suse_linux:mozillafirefox-devel, p-cpe:/a:novell:suse_linux:mozillafirefox-translations-common, p-cpe:/a:novell:suse_linux:mozillafirefox

Required KB Items: Host/local_checks_enabled, Host/cpu, Host/SuSE/release, Host/SuSE/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/27/2026

Vulnerability Publication Date: 6/10/2025

Reference Information

CVE: CVE-2025-59375, CVE-2026-4684, CVE-2026-4685, CVE-2026-4686, CVE-2026-4687, CVE-2026-4688, CVE-2026-4689, CVE-2026-4690, CVE-2026-4691, CVE-2026-4692, CVE-2026-4693, CVE-2026-4694, CVE-2026-4695, CVE-2026-4696, CVE-2026-4697, CVE-2026-4698, CVE-2026-4699, CVE-2026-4700, CVE-2026-4701, CVE-2026-4702, CVE-2026-4704, CVE-2026-4705, CVE-2026-4706, CVE-2026-4707, CVE-2026-4708, CVE-2026-4709, CVE-2026-4710, CVE-2026-4711, CVE-2026-4712, CVE-2026-4713, CVE-2026-4714, CVE-2026-4715, CVE-2026-4716, CVE-2026-4717, CVE-2026-4718, CVE-2026-4719, CVE-2026-4720, CVE-2026-4721

SuSE: SUSE-SU-2026:1127-1