Alert GCSA-26069 - Aggiornamento di sicurezza per prodotti Mozilla

-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ****************************************************************** Alert ID: GCSA-26069 Data: 22 Aprile 2026 Titolo: Aggiornamento di sicurezza per prodotti Mozilla ****************************************************************** :: Descrizione del problema Sono state riscontrate vulnerabilita' multiple nei prodotti Mozilla, che potrebbero consentire ad un attaccante remoto l'esecuzione di codice arbitrario, l'innalzamento dei privilegi, spoofing, oltrepassare restrizioni di sicurezza ed innescare condizioni di Denial of Service su un sistema affetto. Maggiori informazioni sono disponibili alla sezione "Riferimenti". :: Software interessato Firefox versioni precedenti alla 150 Firefox ESR versioni precedenti alla 115.35 Firefox ESR versioni precedenti alla 140.10 Thunderbird versioni precedenti alla 140.10 Thunderbird versioni precedenti alla 150 :: Impatto Denial of Service Remote Code Execution Information Disclosure Security Restriction Bypass Elevation of Privilege Spoofing :: Soluzioni Aggiornare Firefox all'ultima versione https://support.mozilla.org/en-US/kb/update-firefox-latest-release https://www.mozilla.org/it/firefox/new/ https://www.mozilla.org/it/firefox/enterprise/ https://www.mozilla.org/it/firefox/all/#product-desktop-release Aggiornare Thunderbird all'ultima versione https://support.mozilla.org/it/kb/aggiornamento-di-thunderbird https://www.mozilla.org/it/thunderbird/ https://www.thunderbird.net/it/thunderbird/all/ https://www.thunderbird.net/it/thunderbird/releases/ :: Riferimenti Mozilla Foundation Security Advisory https://www.mozilla.org/en-US/security/advisories/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-30/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-31/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-32/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-33/ https://www.mozilla.org/en-US/security/advisories/mfsa2026-34/ Mitre CVE https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-2781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6746 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6747 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6748 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6749 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6750 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6751 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6752 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6753 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6754 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6755 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6756 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6757 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6758 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6759 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6760 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6761 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6762 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6763 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6764 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6765 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6766 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6767 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6768 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6769 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6770 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6771 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6772 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6773 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6774 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6775 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6776 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6777 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6778 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6779 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6780 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6781 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6782 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6783 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6784 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6785 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-6786 GARR CERT Security Alert - subscribe/unsubscribe: https://www.cert.garr.it/alert/ricevi-gli-alert-di-cert -----BEGIN PGP SIGNATURE----- iFwEAREIAB0WIQTGpdiR5MqstacBGHbBnEyTZRJgQgUCaeh9JgAKCRDBnEyTZRJg QrVZAJiJw4aPcy/wCeXrSLmSARR8lgIYAKCc4oN1H0RFJ+R1rFiIPiIP8501jw== =lPj9 -----END PGP SIGNATURE-----