<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2026-04-28T05:23:26</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:202610767" version="501" class="patch">
<metadata>
<title>
ELSA-2026-10767:  firefox security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 10</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2026-10767" ref_url="https://linux.oracle.com/errata/ELSA-2026-10767.html"/>
<reference source="CVE" ref_id="CVE-2026-6746" ref_url="https://linux.oracle.com/cve/CVE-2026-6746.html"/>
<reference source="CVE" ref_id="CVE-2026-6747" ref_url="https://linux.oracle.com/cve/CVE-2026-6747.html"/>
<reference source="CVE" ref_id="CVE-2026-6748" ref_url="https://linux.oracle.com/cve/CVE-2026-6748.html"/>
<reference source="CVE" ref_id="CVE-2026-6749" ref_url="https://linux.oracle.com/cve/CVE-2026-6749.html"/>
<reference source="CVE" ref_id="CVE-2026-6750" ref_url="https://linux.oracle.com/cve/CVE-2026-6750.html"/>
<reference source="CVE" ref_id="CVE-2026-6751" ref_url="https://linux.oracle.com/cve/CVE-2026-6751.html"/>
<reference source="CVE" ref_id="CVE-2026-6752" ref_url="https://linux.oracle.com/cve/CVE-2026-6752.html"/>
<reference source="CVE" ref_id="CVE-2026-6753" ref_url="https://linux.oracle.com/cve/CVE-2026-6753.html"/>
<reference source="CVE" ref_id="CVE-2026-6754" ref_url="https://linux.oracle.com/cve/CVE-2026-6754.html"/>
<reference source="CVE" ref_id="CVE-2026-6757" ref_url="https://linux.oracle.com/cve/CVE-2026-6757.html"/>
<reference source="CVE" ref_id="CVE-2026-6759" ref_url="https://linux.oracle.com/cve/CVE-2026-6759.html"/>
<reference source="CVE" ref_id="CVE-2026-6761" ref_url="https://linux.oracle.com/cve/CVE-2026-6761.html"/>
<reference source="CVE" ref_id="CVE-2026-6762" ref_url="https://linux.oracle.com/cve/CVE-2026-6762.html"/>
<reference source="CVE" ref_id="CVE-2026-6763" ref_url="https://linux.oracle.com/cve/CVE-2026-6763.html"/>
<reference source="CVE" ref_id="CVE-2026-6764" ref_url="https://linux.oracle.com/cve/CVE-2026-6764.html"/>
<reference source="CVE" ref_id="CVE-2026-6765" ref_url="https://linux.oracle.com/cve/CVE-2026-6765.html"/>
<reference source="CVE" ref_id="CVE-2026-6766" ref_url="https://linux.oracle.com/cve/CVE-2026-6766.html"/>
<reference source="CVE" ref_id="CVE-2026-6767" ref_url="https://linux.oracle.com/cve/CVE-2026-6767.html"/>
<reference source="CVE" ref_id="CVE-2026-6769" ref_url="https://linux.oracle.com/cve/CVE-2026-6769.html"/>
<reference source="CVE" ref_id="CVE-2026-6770" ref_url="https://linux.oracle.com/cve/CVE-2026-6770.html"/>
<reference source="CVE" ref_id="CVE-2026-6771" ref_url="https://linux.oracle.com/cve/CVE-2026-6771.html"/>
<reference source="CVE" ref_id="CVE-2026-6772" ref_url="https://linux.oracle.com/cve/CVE-2026-6772.html"/>
<reference source="CVE" ref_id="CVE-2026-6776" ref_url="https://linux.oracle.com/cve/CVE-2026-6776.html"/>
<reference source="CVE" ref_id="CVE-2026-6785" ref_url="https://linux.oracle.com/cve/CVE-2026-6785.html"/>
<reference source="CVE" ref_id="CVE-2026-6786" ref_url="https://linux.oracle.com/cve/CVE-2026-6786.html"/>

<description>
[140.10.0-1.0.1]
- Fix firefox-oracle-default-prefs.js for new nss [Orabug: 37079773]
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat file

[140.10.0-1]
- Update to 140.10.0 ESR
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2026 Oracle, Inc.</rights>
<issued date="2026-04-27"/>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6746.html" public="20260421">CVE-2026-6746</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6747.html" public="20260421">CVE-2026-6747</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6748.html" public="20260421">CVE-2026-6748</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6749.html" public="20260421">CVE-2026-6749</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6750.html" public="20260421">CVE-2026-6750</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6751.html" public="20260421">CVE-2026-6751</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6752.html" public="20260421">CVE-2026-6752</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6753.html" public="20260421">CVE-2026-6753</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6754.html" public="20260421">CVE-2026-6754</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6757.html" public="20260421">CVE-2026-6757</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6759.html" public="20260421">CVE-2026-6759</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6761.html" public="20260421">CVE-2026-6761</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6762.html" public="20260421">CVE-2026-6762</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6763.html" public="20260421">CVE-2026-6763</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6764.html" public="20260421">CVE-2026-6764</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6765.html" public="20260421">CVE-2026-6765</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6766.html" public="20260421">CVE-2026-6766</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6767.html" public="20260421">CVE-2026-6767</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6769.html" public="20260421">CVE-2026-6769</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6770.html" public="20260421">CVE-2026-6770</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6771.html" public="20260421">CVE-2026-6771</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-6772.html" public="20260421">CVE-2026-6772</cve>
<cve cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-6776.html" public="20260421">CVE-2026-6776</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6785.html" public="20260426">CVE-2026-6785</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-6786.html" public="20260426">CVE-2026-6786</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:10::appstream</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202610767001" comment="Oracle Linux 10 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202610767002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202610767003" comment="firefox is earlier than 0:140.10.0-1.0.1.el10_1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202610767004" comment="firefox is signed with the Oracle Linux 10 key"/>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202610767005" comment="Oracle Linux arch is x86_64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:202610767003" comment="firefox is earlier than 0:140.10.0-1.0.1.el10_1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:202610767004" comment="firefox is signed with the Oracle Linux 10 key"/>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:202610767001"  version="501" comment="Oracle Linux 10 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202610767001" />
<state state_ref="oval:com.oracle.elsa:ste:202610767002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202610767002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202610767001" />
<state state_ref="oval:com.oracle.elsa:ste:202610767003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202610767003"  version="501" comment="firefox is earlier than 0:140.10.0-1.0.1.el10_1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202610767002" />
<state state_ref="oval:com.oracle.elsa:ste:202610767004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202610767004"  version="501" comment="firefox is signed with the Oracle Linux 10 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202610767002" />
<state state_ref="oval:com.oracle.elsa:ste:202610767001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:202610767005"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:202610767001" />
<state state_ref="oval:com.oracle.elsa:ste:202610767005" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:202610767002" version="501">
<name>firefox</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:202610767001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>
</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202610767001" version="501">
<signature_keyid operation="equals">bc4d06a08d8b756f</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202610767002" version="501">
<version operation="pattern match">^10</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202610767003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202610767004" version="501">
<evr datatype="evr_string" operation="less than">0:140.10.0-1.0.1.el10_1</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:202610767005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
