<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2026-03-03T02:16:49</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20263517" version="501" class="patch">
<metadata>
<title>
ELSA-2026-3517:  thunderbird security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 10</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2026-3517" ref_url="https://linux.oracle.com/errata/ELSA-2026-3517.html"/>
<reference source="CVE" ref_id="CVE-2026-2447" ref_url="https://linux.oracle.com/cve/CVE-2026-2447.html"/>
<reference source="CVE" ref_id="CVE-2026-2757" ref_url="https://linux.oracle.com/cve/CVE-2026-2757.html"/>
<reference source="CVE" ref_id="CVE-2026-2758" ref_url="https://linux.oracle.com/cve/CVE-2026-2758.html"/>
<reference source="CVE" ref_id="CVE-2026-2759" ref_url="https://linux.oracle.com/cve/CVE-2026-2759.html"/>
<reference source="CVE" ref_id="CVE-2026-2760" ref_url="https://linux.oracle.com/cve/CVE-2026-2760.html"/>
<reference source="CVE" ref_id="CVE-2026-2761" ref_url="https://linux.oracle.com/cve/CVE-2026-2761.html"/>
<reference source="CVE" ref_id="CVE-2026-2762" ref_url="https://linux.oracle.com/cve/CVE-2026-2762.html"/>
<reference source="CVE" ref_id="CVE-2026-2763" ref_url="https://linux.oracle.com/cve/CVE-2026-2763.html"/>
<reference source="CVE" ref_id="CVE-2026-2764" ref_url="https://linux.oracle.com/cve/CVE-2026-2764.html"/>
<reference source="CVE" ref_id="CVE-2026-2765" ref_url="https://linux.oracle.com/cve/CVE-2026-2765.html"/>
<reference source="CVE" ref_id="CVE-2026-2766" ref_url="https://linux.oracle.com/cve/CVE-2026-2766.html"/>
<reference source="CVE" ref_id="CVE-2026-2767" ref_url="https://linux.oracle.com/cve/CVE-2026-2767.html"/>
<reference source="CVE" ref_id="CVE-2026-2768" ref_url="https://linux.oracle.com/cve/CVE-2026-2768.html"/>
<reference source="CVE" ref_id="CVE-2026-2769" ref_url="https://linux.oracle.com/cve/CVE-2026-2769.html"/>
<reference source="CVE" ref_id="CVE-2026-2770" ref_url="https://linux.oracle.com/cve/CVE-2026-2770.html"/>
<reference source="CVE" ref_id="CVE-2026-2771" ref_url="https://linux.oracle.com/cve/CVE-2026-2771.html"/>
<reference source="CVE" ref_id="CVE-2026-2772" ref_url="https://linux.oracle.com/cve/CVE-2026-2772.html"/>
<reference source="CVE" ref_id="CVE-2026-2773" ref_url="https://linux.oracle.com/cve/CVE-2026-2773.html"/>
<reference source="CVE" ref_id="CVE-2026-2774" ref_url="https://linux.oracle.com/cve/CVE-2026-2774.html"/>
<reference source="CVE" ref_id="CVE-2026-2775" ref_url="https://linux.oracle.com/cve/CVE-2026-2775.html"/>
<reference source="CVE" ref_id="CVE-2026-2776" ref_url="https://linux.oracle.com/cve/CVE-2026-2776.html"/>
<reference source="CVE" ref_id="CVE-2026-2777" ref_url="https://linux.oracle.com/cve/CVE-2026-2777.html"/>
<reference source="CVE" ref_id="CVE-2026-2778" ref_url="https://linux.oracle.com/cve/CVE-2026-2778.html"/>
<reference source="CVE" ref_id="CVE-2026-2779" ref_url="https://linux.oracle.com/cve/CVE-2026-2779.html"/>
<reference source="CVE" ref_id="CVE-2026-2780" ref_url="https://linux.oracle.com/cve/CVE-2026-2780.html"/>
<reference source="CVE" ref_id="CVE-2026-2781" ref_url="https://linux.oracle.com/cve/CVE-2026-2781.html"/>
<reference source="CVE" ref_id="CVE-2026-2782" ref_url="https://linux.oracle.com/cve/CVE-2026-2782.html"/>
<reference source="CVE" ref_id="CVE-2026-2783" ref_url="https://linux.oracle.com/cve/CVE-2026-2783.html"/>
<reference source="CVE" ref_id="CVE-2026-2784" ref_url="https://linux.oracle.com/cve/CVE-2026-2784.html"/>
<reference source="CVE" ref_id="CVE-2026-2785" ref_url="https://linux.oracle.com/cve/CVE-2026-2785.html"/>
<reference source="CVE" ref_id="CVE-2026-2786" ref_url="https://linux.oracle.com/cve/CVE-2026-2786.html"/>
<reference source="CVE" ref_id="CVE-2026-2787" ref_url="https://linux.oracle.com/cve/CVE-2026-2787.html"/>
<reference source="CVE" ref_id="CVE-2026-2788" ref_url="https://linux.oracle.com/cve/CVE-2026-2788.html"/>
<reference source="CVE" ref_id="CVE-2026-2789" ref_url="https://linux.oracle.com/cve/CVE-2026-2789.html"/>
<reference source="CVE" ref_id="CVE-2026-2790" ref_url="https://linux.oracle.com/cve/CVE-2026-2790.html"/>
<reference source="CVE" ref_id="CVE-2026-2791" ref_url="https://linux.oracle.com/cve/CVE-2026-2791.html"/>
<reference source="CVE" ref_id="CVE-2026-2792" ref_url="https://linux.oracle.com/cve/CVE-2026-2792.html"/>
<reference source="CVE" ref_id="CVE-2026-2793" ref_url="https://linux.oracle.com/cve/CVE-2026-2793.html"/>

<description>
[140.8.0-2.0.1]
- Add Oracle prefs

[140.8.0-2]
- Update to 140.8.0 ESR
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2026 Oracle, Inc.</rights>
<issued date="2026-03-02"/>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2447.html" public="20260216">CVE-2026-2447</cve>
<cve cvss3="7.1/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:L" href="https://linux.oracle.com/cve/CVE-2026-2757.html" public="20260224">CVE-2026-2757</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2758.html" public="20260224">CVE-2026-2758</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2759.html" public="20260224">CVE-2026-2759</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2760.html" public="20260224">CVE-2026-2760</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2761.html" public="20260224">CVE-2026-2761</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2762.html" public="20260224">CVE-2026-2762</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2763.html" public="20260224">CVE-2026-2763</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2764.html" public="20260224">CVE-2026-2764</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2765.html" public="20260224">CVE-2026-2765</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2766.html" public="20260224">CVE-2026-2766</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2767.html" public="20260224">CVE-2026-2767</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2768.html" public="20260224">CVE-2026-2768</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2769.html" public="20260224">CVE-2026-2769</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2770.html" public="20260224">CVE-2026-2770</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2771.html" public="20260224">CVE-2026-2771</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2772.html" public="20260224">CVE-2026-2772</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2773.html" public="20260224">CVE-2026-2773</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2774.html" public="20260224">CVE-2026-2774</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2775.html" public="20260224">CVE-2026-2775</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2776.html" public="20260224">CVE-2026-2776</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2777.html" public="20260224">CVE-2026-2777</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2778.html" public="20260224">CVE-2026-2778</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2779.html" public="20260224">CVE-2026-2779</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2780.html" public="20260224">CVE-2026-2780</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2781.html" public="20260224">CVE-2026-2781</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2782.html" public="20260224">CVE-2026-2782</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2783.html" public="20260224">CVE-2026-2783</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2784.html" public="20260224">CVE-2026-2784</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2785.html" public="20260224">CVE-2026-2785</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2786.html" public="20260224">CVE-2026-2786</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2787.html" public="20260224">CVE-2026-2787</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2788.html" public="20260224">CVE-2026-2788</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-2789.html" public="20260224">CVE-2026-2789</cve>
<cve cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-2790.html" public="20260224">CVE-2026-2790</cve>
<cve cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-2791.html" public="20260224">CVE-2026-2791</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2792.html" public="20260224">CVE-2026-2792</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-2793.html" public="20260224">CVE-2026-2793</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:10::appstream</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20263517001" comment="Oracle Linux 10 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20263517002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20263517003" comment="thunderbird is earlier than 0:140.8.0-2.0.1.el10_1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20263517004" comment="thunderbird is signed with the Oracle Linux 10 key"/>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20263517005" comment="Oracle Linux arch is x86_64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20263517003" comment="thunderbird is earlier than 0:140.8.0-2.0.1.el10_1"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20263517004" comment="thunderbird is signed with the Oracle Linux 10 key"/>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20263517001"  version="501" comment="Oracle Linux 10 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20263517001" />
<state state_ref="oval:com.oracle.elsa:ste:20263517002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20263517002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20263517001" />
<state state_ref="oval:com.oracle.elsa:ste:20263517003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20263517003"  version="501" comment="thunderbird is earlier than 0:140.8.0-2.0.1.el10_1" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20263517002" />
<state state_ref="oval:com.oracle.elsa:ste:20263517004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20263517004"  version="501" comment="thunderbird is signed with the Oracle Linux 10 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20263517002" />
<state state_ref="oval:com.oracle.elsa:ste:20263517001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20263517005"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20263517001" />
<state state_ref="oval:com.oracle.elsa:ste:20263517005" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20263517002" version="501">
<name>thunderbird</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20263517001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>

</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20263517001" version="501">
<signature_keyid operation="equals">bc4d06a08d8b756f</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20263517002" version="501">
<version operation="pattern match">^10</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20263517003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20263517004" version="501">
<evr datatype="evr_string" operation="less than">0:140.8.0-2.0.1.el10_1</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20263517005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
