RHSA-2026:5932

Vulnerability from csaf_redhat - Published: 2026-03-26 11:38 - Updated: 2026-03-30 17:25
Summary
Red Hat Security Advisory: firefox security update
Severity
Important
Notes
Topic: An update for firefox is now available for Red Hat Enterprise Linux 8. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
Details: Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. Security Fix(es): * firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721) * firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717) * firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698) * firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716) * firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705) * firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710) * firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690) * firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686) * firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708) * firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691) * firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699) * firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696) * firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693) * firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718) * firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719) * firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694) * firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692) * firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720) * firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700) * firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707) * firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704) * firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Terms of Use: This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Race condition, use-after-free in the Graphics: WebRender component

CWE-364 - Signal Handler Race Condition
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics: Canvas2D component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics: Canvas2D component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to incorrect boundary conditions in the Telemetry component

CWE-501 - Trust Boundary Violation
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to use-after-free in the Disability Access APIs component

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component

CWE-190 - Integer Overflow or Wraparound
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component

CWE-190 - Integer Overflow or Wraparound
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Use-after-free in the CSS Parsing and Computation component

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Sandbox escape in the Responsive Design Mode component

CWE-653 - Improper Isolation or Compartmentalization
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video: Playback component

CWE-823 - Use of Out-of-range Pointer Offset
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions, integer overflow in the Graphics component

CWE-190 - Integer Overflow or Wraparound
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video: Web Codecs component

CWE-131 - Incorrect Calculation of Buffer Size
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Use-after-free in the Layout: Text and Fonts component

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video: Web Codecs component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: JIT miscompilation in the JavaScript Engine: JIT component

CWE-733 - Compiler Optimization Removal or Modification of Security-critical Code
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Layout: Text and Fonts component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Mitigation bypass in the Networking: HTTP component

CWE-444 - Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Use-after-free in the JavaScript Engine component

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: JIT miscompilation in the JavaScript Engine component

CWE-733 - Compiler Optimization Removal or Modification of Security-critical Code
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Denial-of-service in the WebRTC: Signaling component

CWE-770 - Allocation of Resources Without Limits or Throttling
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Undefined behavior in the WebRTC: Signaling component

CWE-475 - Undefined Behavior for Input to API
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics: Canvas2D component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics: Canvas2D component

CWE-823 - Use of Out-of-range Pointer Offset
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video: GMP component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Use-after-free in the Widget: Cocoa component

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Information disclosure in the Widget: Cocoa component

CWE-359 - Exposure of Private Personal Information to an Unauthorized Actor
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics component

CWE-787 - Out-of-bounds Write
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Audio/Video component

CWE-125 - Out-of-bounds Read
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Uninitialized memory in the Graphics: Canvas2D component

CWE-824 - Access of Uninitialized Pointer
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component

CWE-824 - Access of Uninitialized Pointer
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Privilege escalation in the Netmonitor component

CWE-266 - Incorrect Privilege Assignment
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Undefined behavior in the WebRTC: Signaling component

CWE-475 - Undefined Behavior for Input to API
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Incorrect boundary conditions in the Graphics: Text component

CWE-805 - Buffer Access with Incorrect Length Value
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Memory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932

A flaw was found in Firefox and Thunderbird. The Mozilla Foundation's Security Advisory describes the following issue: Memory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.

CWE-825 - Expired Pointer Dereference
Vendor Fix For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 https://access.redhat.com/errata/RHSA-2026:5932
References
https://access.redhat.com/errata/RHSA-2026:5932 self
https://access.redhat.com/security/updates/classi… external
https://bugzilla.redhat.com/show_bug.cgi?id=2450710 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450711 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450712 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450713 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450714 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450715 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450718 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450719 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450720 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450721 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450722 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450723 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450724 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450725 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450726 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450727 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450728 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450729 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450730 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450732 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450733 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450734 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450735 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450738 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450739 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450740 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450741 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450742 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450744 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450746 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450747 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450748 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450751 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450752 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450755 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450756 external
https://bugzilla.redhat.com/show_bug.cgi?id=2450757 external
https://security.access.redhat.com/data/csaf/v2/a… self
https://access.redhat.com/security/cve/CVE-2026-4684 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450721 external
https://www.cve.org/CVERecord?id=CVE-2026-4684 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4684 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4685 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450724 external
https://www.cve.org/CVERecord?id=CVE-2026-4685 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4685 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4686 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450734 external
https://www.cve.org/CVERecord?id=CVE-2026-4686 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4686 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4687 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450757 external
https://www.cve.org/CVERecord?id=CVE-2026-4687 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4687 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4688 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450713 external
https://www.cve.org/CVERecord?id=CVE-2026-4688 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4688 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4689 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450718 external
https://www.cve.org/CVERecord?id=CVE-2026-4689 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4689 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4690 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450732 external
https://www.cve.org/CVERecord?id=CVE-2026-4690 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4690 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4691 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450738 external
https://www.cve.org/CVERecord?id=CVE-2026-4691 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4691 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4692 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450748 external
https://www.cve.org/CVERecord?id=CVE-2026-4692 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4692 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4693 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450741 external
https://www.cve.org/CVERecord?id=CVE-2026-4693 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4693 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4694 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450747 external
https://www.cve.org/CVERecord?id=CVE-2026-4694 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4694 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4695 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450715 external
https://www.cve.org/CVERecord?id=CVE-2026-4695 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4695 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4696 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450740 external
https://www.cve.org/CVERecord?id=CVE-2026-4696 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4696 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4697 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450729 external
https://www.cve.org/CVERecord?id=CVE-2026-4697 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4697 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4698 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450719 external
https://www.cve.org/CVERecord?id=CVE-2026-4698 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4698 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4699 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450739 external
https://www.cve.org/CVERecord?id=CVE-2026-4699 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4699 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4700 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450752 external
https://www.cve.org/CVERecord?id=CVE-2026-4700 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4700 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4701 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450710 external
https://www.cve.org/CVERecord?id=CVE-2026-4701 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4701 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4702 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450744 external
https://www.cve.org/CVERecord?id=CVE-2026-4702 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4702 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4704 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450756 external
https://www.cve.org/CVERecord?id=CVE-2026-4704 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4704 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4705 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450722 external
https://www.cve.org/CVERecord?id=CVE-2026-4705 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4705 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4706 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450714 external
https://www.cve.org/CVERecord?id=CVE-2026-4706 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4706 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4707 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450755 external
https://www.cve.org/CVERecord?id=CVE-2026-4707 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4707 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4708 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450735 external
https://www.cve.org/CVERecord?id=CVE-2026-4708 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4708 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4709 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450726 external
https://www.cve.org/CVERecord?id=CVE-2026-4709 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4709 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4710 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450727 external
https://www.cve.org/CVERecord?id=CVE-2026-4710 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4710 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4711 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450733 external
https://www.cve.org/CVERecord?id=CVE-2026-4711 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4711 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4712 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450728 external
https://www.cve.org/CVERecord?id=CVE-2026-4712 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4712 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4713 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450730 external
https://www.cve.org/CVERecord?id=CVE-2026-4713 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4713 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4714 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450725 external
https://www.cve.org/CVERecord?id=CVE-2026-4714 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4714 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4715 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450723 external
https://www.cve.org/CVERecord?id=CVE-2026-4715 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4715 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4716 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450720 external
https://www.cve.org/CVERecord?id=CVE-2026-4716 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4716 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4717 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450712 external
https://www.cve.org/CVERecord?id=CVE-2026-4717 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4717 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4718 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450742 external
https://www.cve.org/CVERecord?id=CVE-2026-4718 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4718 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4719 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450746 external
https://www.cve.org/CVERecord?id=CVE-2026-4719 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4719 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4720 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450751 external
https://www.cve.org/CVERecord?id=CVE-2026-4720 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4720 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external
https://access.redhat.com/security/cve/CVE-2026-4721 self
https://bugzilla.redhat.com/show_bug.cgi?id=2450711 external
https://www.cve.org/CVERecord?id=CVE-2026-4721 external
https://nvd.nist.gov/vuln/detail/CVE-2026-4721 external
https://www.mozilla.org/security/advisories/mfsa2… external
https://www.mozilla.org/security/advisories/mfsa2… external

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://access.redhat.com/security/updates/classification/",
      "text": "Important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "An update for firefox is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
        "title": "Topic"
      },
      {
        "category": "general",
        "text": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nSecurity Fix(es):\n\n* firefox: thunderbird: Use-after-free in the JavaScript Engine component (CVE-2026-4701)\n\n* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4721)\n\n* firefox: thunderbird: Privilege escalation in the Netmonitor component (CVE-2026-4717)\n\n* firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component (CVE-2026-4688)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4706)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4695)\n\n* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4689)\n\n* firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component (CVE-2026-4698)\n\n* firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component (CVE-2026-4716)\n\n* firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component (CVE-2026-4684)\n\n* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4705)\n\n* firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component (CVE-2026-4715)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4685)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4714)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component (CVE-2026-4709)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component (CVE-2026-4710)\n\n* firefox: thunderbird: Information disclosure in the Widget: Cocoa component (CVE-2026-4712)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component (CVE-2026-4697)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4713)\n\n* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component (CVE-2026-4690)\n\n* firefox: thunderbird: Use-after-free in the Widget: Cocoa component (CVE-2026-4711)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4686)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics component (CVE-2026-4708)\n\n* firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component (CVE-2026-4691)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component (CVE-2026-4699)\n\n* firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component (CVE-2026-4696)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component (CVE-2026-4693)\n\n* firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component (CVE-2026-4718)\n\n* firefox: thunderbird: JIT miscompilation in the JavaScript Engine component (CVE-2026-4702)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component (CVE-2026-4719)\n\n* firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component (CVE-2026-4694)\n\n* firefox: thunderbird: Sandbox escape in the Responsive Design Mode component (CVE-2026-4692)\n\n* firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149 (CVE-2026-4720)\n\n* firefox: thunderbird: Mitigation bypass in the Networking: HTTP component (CVE-2026-4700)\n\n* firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component (CVE-2026-4707)\n\n* firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component (CVE-2026-4704)\n\n* firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component (CVE-2026-4687)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
        "title": "Details"
      },
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
        "title": "Terms of Use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://access.redhat.com/security/team/contact/",
      "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
      "name": "Red Hat Product Security",
      "namespace": "https://www.redhat.com"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://access.redhat.com/errata/RHSA-2026:5932",
        "url": "https://access.redhat.com/errata/RHSA-2026:5932"
      },
      {
        "category": "external",
        "summary": "https://access.redhat.com/security/updates/classification/#important",
        "url": "https://access.redhat.com/security/updates/classification/#important"
      },
      {
        "category": "external",
        "summary": "2450710",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450710"
      },
      {
        "category": "external",
        "summary": "2450711",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450711"
      },
      {
        "category": "external",
        "summary": "2450712",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450712"
      },
      {
        "category": "external",
        "summary": "2450713",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450713"
      },
      {
        "category": "external",
        "summary": "2450714",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450714"
      },
      {
        "category": "external",
        "summary": "2450715",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450715"
      },
      {
        "category": "external",
        "summary": "2450718",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450718"
      },
      {
        "category": "external",
        "summary": "2450719",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450719"
      },
      {
        "category": "external",
        "summary": "2450720",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450720"
      },
      {
        "category": "external",
        "summary": "2450721",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450721"
      },
      {
        "category": "external",
        "summary": "2450722",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450722"
      },
      {
        "category": "external",
        "summary": "2450723",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450723"
      },
      {
        "category": "external",
        "summary": "2450724",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450724"
      },
      {
        "category": "external",
        "summary": "2450725",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450725"
      },
      {
        "category": "external",
        "summary": "2450726",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450726"
      },
      {
        "category": "external",
        "summary": "2450727",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450727"
      },
      {
        "category": "external",
        "summary": "2450728",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450728"
      },
      {
        "category": "external",
        "summary": "2450729",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450729"
      },
      {
        "category": "external",
        "summary": "2450730",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450730"
      },
      {
        "category": "external",
        "summary": "2450732",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450732"
      },
      {
        "category": "external",
        "summary": "2450733",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450733"
      },
      {
        "category": "external",
        "summary": "2450734",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450734"
      },
      {
        "category": "external",
        "summary": "2450735",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450735"
      },
      {
        "category": "external",
        "summary": "2450738",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450738"
      },
      {
        "category": "external",
        "summary": "2450739",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450739"
      },
      {
        "category": "external",
        "summary": "2450740",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450740"
      },
      {
        "category": "external",
        "summary": "2450741",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450741"
      },
      {
        "category": "external",
        "summary": "2450742",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450742"
      },
      {
        "category": "external",
        "summary": "2450744",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450744"
      },
      {
        "category": "external",
        "summary": "2450746",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450746"
      },
      {
        "category": "external",
        "summary": "2450747",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450747"
      },
      {
        "category": "external",
        "summary": "2450748",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450748"
      },
      {
        "category": "external",
        "summary": "2450751",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450751"
      },
      {
        "category": "external",
        "summary": "2450752",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450752"
      },
      {
        "category": "external",
        "summary": "2450755",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450755"
      },
      {
        "category": "external",
        "summary": "2450756",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450756"
      },
      {
        "category": "external",
        "summary": "2450757",
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450757"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2026/rhsa-2026_5932.json"
      }
    ],
    "title": "Red Hat Security Advisory: firefox security update",
    "tracking": {
      "current_release_date": "2026-03-30T17:25:20+00:00",
      "generator": {
        "date": "2026-03-30T17:25:20+00:00",
        "engine": {
          "name": "Red Hat SDEngine",
          "version": "4.7.4"
        }
      },
      "id": "RHSA-2026:5932",
      "initial_release_date": "2026-03-26T11:38:50+00:00",
      "revision_history": [
        {
          "date": "2026-03-26T11:38:50+00:00",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-03-26T11:38:50+00:00",
          "number": "2",
          "summary": "Last updated version"
        },
        {
          "date": "2026-03-30T17:25:20+00:00",
          "number": "3",
          "summary": "Last generated version"
        }
      ],
      "status": "final",
      "version": "3"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                "product": {
                  "name": "Red Hat Enterprise Linux AppStream (v. 8)",
                  "product_id": "AppStream-8.10.0.Z.MAIN.EUS",
                  "product_identification_helper": {
                    "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Red Hat Enterprise Linux"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:140.9.0-1.el8_10.src",
                "product": {
                  "name": "firefox-0:140.9.0-1.el8_10.src",
                  "product_id": "firefox-0:140.9.0-1.el8_10.src",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@140.9.0-1.el8_10?arch=src"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "src"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:140.9.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-0:140.9.0-1.el8_10.aarch64",
                  "product_id": "firefox-0:140.9.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@140.9.0-1.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
                  "product_id": "firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@140.9.0-1.el8_10?arch=aarch64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
                "product": {
                  "name": "firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
                  "product_id": "firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@140.9.0-1.el8_10?arch=aarch64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:140.9.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-0:140.9.0-1.el8_10.ppc64le",
                  "product_id": "firefox-0:140.9.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@140.9.0-1.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
                  "product_id": "firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@140.9.0-1.el8_10?arch=ppc64le"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
                "product": {
                  "name": "firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
                  "product_id": "firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@140.9.0-1.el8_10?arch=ppc64le"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:140.9.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-0:140.9.0-1.el8_10.x86_64",
                  "product_id": "firefox-0:140.9.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@140.9.0-1.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:140.9.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-debugsource-0:140.9.0-1.el8_10.x86_64",
                  "product_id": "firefox-debugsource-0:140.9.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@140.9.0-1.el8_10?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
                "product": {
                  "name": "firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
                  "product_id": "firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@140.9.0-1.el8_10?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "firefox-0:140.9.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-0:140.9.0-1.el8_10.s390x",
                  "product_id": "firefox-0:140.9.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox@140.9.0-1.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debugsource-0:140.9.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-debugsource-0:140.9.0-1.el8_10.s390x",
                  "product_id": "firefox-debugsource-0:140.9.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debugsource@140.9.0-1.el8_10?arch=s390x"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
                "product": {
                  "name": "firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
                  "product_id": "firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/redhat/firefox-debuginfo@140.9.0-1.el8_10?arch=s390x"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          }
        ],
        "category": "vendor",
        "name": "Red Hat"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:140.9.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-0:140.9.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:140.9.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-0:140.9.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:140.9.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-0:140.9.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:140.9.0-1.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src"
        },
        "product_reference": "firefox-0:140.9.0-1.el8_10.src",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-0:140.9.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-0:140.9.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:140.9.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:140.9.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debuginfo-0:140.9.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:140.9.0-1.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64"
        },
        "product_reference": "firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:140.9.0-1.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le"
        },
        "product_reference": "firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:140.9.0-1.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x"
        },
        "product_reference": "firefox-debugsource-0:140.9.0-1.el8_10.s390x",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "firefox-debugsource-0:140.9.0-1.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
          "product_id": "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        },
        "product_reference": "firefox-debugsource-0:140.9.0-1.el8_10.x86_64",
        "relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-4684",
      "cwe": {
        "id": "CWE-364",
        "name": "Signal Handler Race Condition"
      },
      "discovery_date": "2026-03-24T13:01:57.282912+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450721"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nRace condition, use-after-free in the Graphics: WebRender component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4684"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450721",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450721"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4684",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4684"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4684",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4684"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4684",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4684"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4684",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4684"
        }
      ],
      "release_date": "2026-03-24T12:30:20.420000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Race condition, use-after-free in the Graphics: WebRender component"
    },
    {
      "cve": "CVE-2026-4685",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:07.309342+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450724"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4685"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450724",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450724"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4685",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4685"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4685",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4685"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4685",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4685"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4685",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4685"
        }
      ],
      "release_date": "2026-03-24T12:30:21.064000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component"
    },
    {
      "cve": "CVE-2026-4686",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:40.605154+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450734"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4686"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450734",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450734"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4686",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4686"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4686",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4686"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4686",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4686"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4686",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4686"
        }
      ],
      "release_date": "2026-03-24T12:30:21.639000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component"
    },
    {
      "cve": "CVE-2026-4687",
      "cwe": {
        "id": "CWE-501",
        "name": "Trust Boundary Violation"
      },
      "discovery_date": "2026-03-24T13:03:48.511518+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450757"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nSandbox escape due to incorrect boundary conditions in the Telemetry component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4687"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450757",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450757"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4687",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4687"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4687",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4687"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4687",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4687"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4687",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4687"
        }
      ],
      "release_date": "2026-03-24T12:30:22.179000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions in the Telemetry component"
    },
    {
      "cve": "CVE-2026-4688",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:01:30.214037+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450713"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nSandbox escape due to use-after-free in the Disability Access APIs component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4688"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450713",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450713"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4688",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4688"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4688",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4688"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4688",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4688"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4688",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4688"
        }
      ],
      "release_date": "2026-03-24T12:30:22.710000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Sandbox escape due to use-after-free in the Disability Access APIs component"
    },
    {
      "cve": "CVE-2026-4689",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2026-03-24T13:01:48.103008+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450718"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nSandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4689"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450718",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450718"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4689",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4689"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4689",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4689"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4689",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4689"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4689",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4689"
        }
      ],
      "release_date": "2026-03-24T12:30:23.260000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component"
    },
    {
      "cve": "CVE-2026-4690",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2026-03-24T13:02:32.127968+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450732"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nSandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4690"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450732",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450732"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4690",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4690"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4690",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4690"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4690",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4690"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4690",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4690"
        }
      ],
      "release_date": "2026-03-24T12:30:23.812000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component"
    },
    {
      "cve": "CVE-2026-4691",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:02:54.051693+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450738"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUse-after-free in the CSS Parsing and Computation component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4691"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450738",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450738"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4691",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4691"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4691",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4691"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4691",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4691"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4691",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4691"
        }
      ],
      "release_date": "2026-03-24T12:30:24.376000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Use-after-free in the CSS Parsing and Computation component"
    },
    {
      "cve": "CVE-2026-4692",
      "cwe": {
        "id": "CWE-653",
        "name": "Improper Isolation or Compartmentalization"
      },
      "discovery_date": "2026-03-24T13:03:24.423958+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450748"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nSandbox escape in the Responsive Design Mode component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Sandbox escape in the Responsive Design Mode component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4692"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450748",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450748"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4692",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4692"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4692",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4692"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4692",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4692"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4692",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4692"
        }
      ],
      "release_date": "2026-03-24T12:30:24.864000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Sandbox escape in the Responsive Design Mode component"
    },
    {
      "cve": "CVE-2026-4693",
      "cwe": {
        "id": "CWE-823",
        "name": "Use of Out-of-range Pointer Offset"
      },
      "discovery_date": "2026-03-24T13:03:04.174422+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450741"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video: Playback component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4693"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450741",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450741"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4693",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4693"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4693",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4693"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4693",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4693"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4693",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4693"
        }
      ],
      "release_date": "2026-03-24T12:30:25.391000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Playback component"
    },
    {
      "cve": "CVE-2026-4694",
      "cwe": {
        "id": "CWE-190",
        "name": "Integer Overflow or Wraparound"
      },
      "discovery_date": "2026-03-24T13:03:21.493763+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450747"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions, integer overflow in the Graphics component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4694"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450747",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450747"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4694",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4694"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4694",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4694"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4694",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4694"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4694",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4694"
        }
      ],
      "release_date": "2026-03-24T12:30:25.919000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions, integer overflow in the Graphics component"
    },
    {
      "cve": "CVE-2026-4695",
      "cwe": {
        "id": "CWE-131",
        "name": "Incorrect Calculation of Buffer Size"
      },
      "discovery_date": "2026-03-24T13:01:38.609710+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450715"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video: Web Codecs component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4695"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450715",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450715"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4695",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4695"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4695",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4695"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4695",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4695"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4695",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4695"
        }
      ],
      "release_date": "2026-03-24T12:30:26.409000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component"
    },
    {
      "cve": "CVE-2026-4696",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:03:00.059788+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450740"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUse-after-free in the Layout: Text and Fonts component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4696"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450740",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450740"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4696",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4696"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4696",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4696"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4696",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4696"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4696",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4696"
        }
      ],
      "release_date": "2026-03-24T12:30:26.919000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Use-after-free in the Layout: Text and Fonts component"
    },
    {
      "cve": "CVE-2026-4697",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:22.985141+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450729"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video: Web Codecs component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4697"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450729",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450729"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4697",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4697"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4697",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4697"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4697",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4697"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4697",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4697"
        }
      ],
      "release_date": "2026-03-24T12:30:27.383000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: Web Codecs component"
    },
    {
      "cve": "CVE-2026-4698",
      "cwe": {
        "id": "CWE-733",
        "name": "Compiler Optimization Removal or Modification of Security-critical Code"
      },
      "discovery_date": "2026-03-24T13:01:51.367869+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450719"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nJIT miscompilation in the JavaScript Engine: JIT component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4698"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450719",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450719"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4698",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4698"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4698",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4698"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4698",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4698"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4698",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4698"
        }
      ],
      "release_date": "2026-03-24T12:30:27.865000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: JIT miscompilation in the JavaScript Engine: JIT component"
    },
    {
      "cve": "CVE-2026-4699",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:57.007557+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450739"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Layout: Text and Fonts component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4699"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450739",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450739"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4699",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4699"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4699",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4699"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4699",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4699"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4699",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4699"
        }
      ],
      "release_date": "2026-03-24T12:30:28.441000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Layout: Text and Fonts component"
    },
    {
      "cve": "CVE-2026-4700",
      "cwe": {
        "id": "CWE-444",
        "name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
      },
      "discovery_date": "2026-03-24T13:03:33.207884+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450752"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nMitigation bypass in the Networking: HTTP component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Mitigation bypass in the Networking: HTTP component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4700"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450752",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450752"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4700",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4700"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4700",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4700"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4700",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4700"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4700",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4700"
        }
      ],
      "release_date": "2026-03-24T12:30:28.913000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Mitigation bypass in the Networking: HTTP component"
    },
    {
      "cve": "CVE-2026-4701",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:01:17.624265+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450710"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUse-after-free in the JavaScript Engine component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Use-after-free in the JavaScript Engine component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4701"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450710",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450710"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4701",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4701"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4701",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4701"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4701",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4701"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4701",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4701"
        }
      ],
      "release_date": "2026-03-24T12:30:29.700000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Use-after-free in the JavaScript Engine component"
    },
    {
      "cve": "CVE-2026-4702",
      "cwe": {
        "id": "CWE-733",
        "name": "Compiler Optimization Removal or Modification of Security-critical Code"
      },
      "discovery_date": "2026-03-24T13:03:12.985864+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450744"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nJIT miscompilation in the JavaScript Engine component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: JIT miscompilation in the JavaScript Engine component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4702"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450744",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450744"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4702",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4702"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4702",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4702"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4702",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4702"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4702",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4702"
        }
      ],
      "release_date": "2026-03-24T12:30:30.743000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: JIT miscompilation in the JavaScript Engine component"
    },
    {
      "cve": "CVE-2026-4704",
      "cwe": {
        "id": "CWE-770",
        "name": "Allocation of Resources Without Limits or Throttling"
      },
      "discovery_date": "2026-03-24T13:03:45.532679+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450756"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nDenial-of-service in the WebRTC: Signaling component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4704"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450756",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450756"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4704",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4704"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4704",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4704"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4704",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4704"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4704",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4704"
        }
      ],
      "release_date": "2026-03-24T12:30:32.214000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Denial-of-service in the WebRTC: Signaling component"
    },
    {
      "cve": "CVE-2026-4705",
      "cwe": {
        "id": "CWE-475",
        "name": "Undefined Behavior for Input to API"
      },
      "discovery_date": "2026-03-24T13:02:00.517411+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450722"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUndefined behavior in the WebRTC: Signaling component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4705"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450722",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450722"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4705",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4705"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4705",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4705"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4705",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4705"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4705",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4705"
        }
      ],
      "release_date": "2026-03-24T12:30:32.731000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component"
    },
    {
      "cve": "CVE-2026-4706",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:01:34.521502+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450714"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4706"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450714",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450714"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4706",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4706"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4706",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4706"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4706",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4706"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4706",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4706"
        }
      ],
      "release_date": "2026-03-24T12:30:33.263000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component"
    },
    {
      "cve": "CVE-2026-4707",
      "cwe": {
        "id": "CWE-823",
        "name": "Use of Out-of-range Pointer Offset"
      },
      "discovery_date": "2026-03-24T13:03:42.010687+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450755"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4707"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450755",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450755"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4707",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4707"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4707",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4707"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4707",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4707"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4707",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4707"
        }
      ],
      "release_date": "2026-03-24T12:30:33.906000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Canvas2D component"
    },
    {
      "cve": "CVE-2026-4708",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:44.732071+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450735"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4708"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450735",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450735"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4708",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4708"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4708",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4708"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4708",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4708"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4708",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4708"
        }
      ],
      "release_date": "2026-03-24T12:30:34.423000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics component"
    },
    {
      "cve": "CVE-2026-4709",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:13.561633+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450726"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video: GMP component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4709"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450726",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450726"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4709",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4709"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4709",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4709"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4709",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4709"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4709",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4709"
        }
      ],
      "release_date": "2026-03-24T12:30:35.375000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video: GMP component"
    },
    {
      "cve": "CVE-2026-4710",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:16.791777+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450727"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4710"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450727",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450727"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4710",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4710"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4710",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4710"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4710",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4710"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4710",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4710"
        }
      ],
      "release_date": "2026-03-24T12:30:35.852000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component"
    },
    {
      "cve": "CVE-2026-4711",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:02:36.416841+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450733"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUse-after-free in the Widget: Cocoa component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Use-after-free in the Widget: Cocoa component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4711"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450733",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450733"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4711",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4711"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4711",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4711"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4711",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4711"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4711",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4711"
        }
      ],
      "release_date": "2026-03-24T12:30:36.392000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Use-after-free in the Widget: Cocoa component"
    },
    {
      "cve": "CVE-2026-4712",
      "cwe": {
        "id": "CWE-359",
        "name": "Exposure of Private Personal Information to an Unauthorized Actor"
      },
      "discovery_date": "2026-03-24T13:02:19.943989+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450728"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nInformation disclosure in the Widget: Cocoa component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Information disclosure in the Widget: Cocoa component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4712"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450728",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450728"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4712",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4712"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4712",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4712"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4712",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4712"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4712",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4712"
        }
      ],
      "release_date": "2026-03-24T12:30:37.333000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Information disclosure in the Widget: Cocoa component"
    },
    {
      "cve": "CVE-2026-4713",
      "cwe": {
        "id": "CWE-787",
        "name": "Out-of-bounds Write"
      },
      "discovery_date": "2026-03-24T13:02:25.944668+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450730"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4713"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450730",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450730"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4713",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4713"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4713",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4713"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4713",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4713"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4713",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4713"
        }
      ],
      "release_date": "2026-03-24T12:30:37.800000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics component"
    },
    {
      "cve": "CVE-2026-4714",
      "cwe": {
        "id": "CWE-125",
        "name": "Out-of-bounds Read"
      },
      "discovery_date": "2026-03-24T13:02:10.447955+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450725"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Audio/Video component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4714"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450725",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450725"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4714",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4714"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4714",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4714"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4714",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4714"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4714",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4714"
        }
      ],
      "release_date": "2026-03-24T12:30:38.311000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Audio/Video component"
    },
    {
      "cve": "CVE-2026-4715",
      "cwe": {
        "id": "CWE-824",
        "name": "Access of Uninitialized Pointer"
      },
      "discovery_date": "2026-03-24T13:02:04.455518+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450723"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUninitialized memory in the Graphics: Canvas2D component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4715"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450723",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450723"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4715",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4715"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4715",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4715"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4715",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4715"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4715",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4715"
        }
      ],
      "release_date": "2026-03-24T12:30:38.831000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Uninitialized memory in the Graphics: Canvas2D component"
    },
    {
      "cve": "CVE-2026-4716",
      "cwe": {
        "id": "CWE-824",
        "name": "Access of Uninitialized Pointer"
      },
      "discovery_date": "2026-03-24T13:01:54.479414+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450720"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions, uninitialized memory in the JavaScript Engine component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4716"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450720",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450720"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4716",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4716"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4716",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4716"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4716",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4716"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4716",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4716"
        }
      ],
      "release_date": "2026-03-24T12:30:39.453000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions, uninitialized memory in the JavaScript Engine component"
    },
    {
      "cve": "CVE-2026-4717",
      "cwe": {
        "id": "CWE-266",
        "name": "Incorrect Privilege Assignment"
      },
      "discovery_date": "2026-03-24T13:01:26.308051+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450712"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nPrivilege escalation in the Netmonitor component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Privilege escalation in the Netmonitor component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4717"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450712",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450712"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4717",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4717"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4717",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4717"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4717",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4717"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4717",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4717"
        }
      ],
      "release_date": "2026-03-24T12:30:40.175000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ],
      "title": "firefox: thunderbird: Privilege escalation in the Netmonitor component"
    },
    {
      "cve": "CVE-2026-4718",
      "cwe": {
        "id": "CWE-475",
        "name": "Undefined Behavior for Input to API"
      },
      "discovery_date": "2026-03-24T13:03:07.232171+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450742"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nUndefined behavior in the WebRTC: Signaling component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4718"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450742",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450742"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4718",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4718"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4718",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4718"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4718",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4718"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4718",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4718"
        }
      ],
      "release_date": "2026-03-24T12:30:42.279000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "firefox: thunderbird: Undefined behavior in the WebRTC: Signaling component"
    },
    {
      "cve": "CVE-2026-4719",
      "cwe": {
        "id": "CWE-805",
        "name": "Buffer Access with Incorrect Length Value"
      },
      "discovery_date": "2026-03-24T13:03:18.510994+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450746"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nIncorrect boundary conditions in the Graphics: Text component",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4719"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450746",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450746"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4719",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4719"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4719",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4719"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4719",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4719"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4719",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4719"
        }
      ],
      "release_date": "2026-03-24T12:30:42.762000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "NONE",
            "baseScore": 3.4,
            "baseSeverity": "LOW",
            "confidentialityImpact": "LOW",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ],
      "title": "firefox: thunderbird: Incorrect boundary conditions in the Graphics: Text component"
    },
    {
      "cve": "CVE-2026-4720",
      "cwe": {
        "id": "CWE-120",
        "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
      },
      "discovery_date": "2026-03-24T13:03:30.400947+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450751"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nMemory safety bugs present in Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4720"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450751",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450751"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4720",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4720"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4720",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4720"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4720",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4720"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4720",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4720"
        }
      ],
      "release_date": "2026-03-24T12:30:43.271000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149"
    },
    {
      "cve": "CVE-2026-4721",
      "cwe": {
        "id": "CWE-825",
        "name": "Expired Pointer Dereference"
      },
      "discovery_date": "2026-03-24T13:01:21.825225+00:00",
      "ids": [
        {
          "system_name": "Red Hat Bugzilla ID",
          "text": "2450711"
        }
      ],
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in Firefox and Thunderbird. The Mozilla Foundation\u0027s Security Advisory describes the following issue:\nMemory safety bugs present in Firefox ESR 115.33, Firefox ESR 140.8, Thunderbird ESR 140.8, Firefox 148 and Thunderbird 148. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code.",
          "title": "Vulnerability description"
        },
        {
          "category": "summary",
          "text": "firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149",
          "title": "Vulnerability summary"
        },
        {
          "category": "other",
          "text": "Red Hat Product Security rates the severity of this flaw as determined by the Mozilla Foundation Security Advisory.",
          "title": "Statement"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
          "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://access.redhat.com/security/cve/CVE-2026-4721"
        },
        {
          "category": "external",
          "summary": "RHBZ#2450711",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2450711"
        },
        {
          "category": "external",
          "summary": "https://www.cve.org/CVERecord?id=CVE-2026-4721",
          "url": "https://www.cve.org/CVERecord?id=CVE-2026-4721"
        },
        {
          "category": "external",
          "summary": "https://nvd.nist.gov/vuln/detail/CVE-2026-4721",
          "url": "https://nvd.nist.gov/vuln/detail/CVE-2026-4721"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4721",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-22/#CVE-2026-4721"
        },
        {
          "category": "external",
          "summary": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4721",
          "url": "https://www.mozilla.org/security/advisories/mfsa2026-24/#CVE-2026-4721"
        }
      ],
      "release_date": "2026-03-24T12:30:44.312000+00:00",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-03-26T11:38:50+00:00",
          "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
          "product_ids": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ],
          "restart_required": {
            "category": "none"
          },
          "url": "https://access.redhat.com/errata/RHSA-2026:5932"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.src",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debuginfo-0:140.9.0-1.el8_10.x86_64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.aarch64",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.ppc64le",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.s390x",
            "AppStream-8.10.0.Z.MAIN.EUS:firefox-debugsource-0:140.9.0-1.el8_10.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Important"
        }
      ],
      "title": "firefox: thunderbird: Memory safety bugs fixed in Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird ESR 140.9, Firefox 149 and Thunderbird 149"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…