Bug 2450718 (CVE-2026-4689) - CVE-2026-4689 firefox: thunderbird: Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component
Summary: CVE-2026-4689 firefox: thunderbird: Sandbox escape due to incorrect boundary ...
Keywords:
Status: NEW
Alias: CVE-2026-4689
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-03-24 13:02 UTC by OSIDB Bzimport
Modified: 2026-03-26 11:33 UTC (History)
5 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2026:5930 0 None None None 2026-03-26 11:31:45 UTC
Red Hat Product Errata RHSA-2026:5931 0 None None None 2026-03-26 11:21:15 UTC
Red Hat Product Errata RHSA-2026:5932 0 None None None 2026-03-26 11:33:07 UTC

Description OSIDB Bzimport 2026-03-24 13:02:11 UTC
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability affects Firefox < 149, Firefox ESR < 115.34, and Firefox ESR < 140.9.

Comment 1 errata-xmlrpc 2026-03-26 11:21:14 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 10

Via RHSA-2026:5931 https://access.redhat.com/errata/RHSA-2026:5931

Comment 2 errata-xmlrpc 2026-03-26 11:31:44 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2026:5930 https://access.redhat.com/errata/RHSA-2026:5930

Comment 3 errata-xmlrpc 2026-03-26 11:33:05 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2026:5932 https://access.redhat.com/errata/RHSA-2026:5932


Note You need to log in before you can comment on or make changes to this bug.