<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2026-04-08T09:14:50</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20266917" version="501" class="patch">
<metadata>
<title>
ELSA-2026-6917:  thunderbird security update (IMPORTANT)
</title>
<affected family="unix">
<platform>Oracle Linux 8</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2026-6917" ref_url="https://linux.oracle.com/errata/ELSA-2026-6917.html"/>
<reference source="CVE" ref_id="CVE-2026-3889" ref_url="https://linux.oracle.com/cve/CVE-2026-3889.html"/>
<reference source="CVE" ref_id="CVE-2026-4371" ref_url="https://linux.oracle.com/cve/CVE-2026-4371.html"/>
<reference source="CVE" ref_id="CVE-2026-4684" ref_url="https://linux.oracle.com/cve/CVE-2026-4684.html"/>
<reference source="CVE" ref_id="CVE-2026-4685" ref_url="https://linux.oracle.com/cve/CVE-2026-4685.html"/>
<reference source="CVE" ref_id="CVE-2026-4686" ref_url="https://linux.oracle.com/cve/CVE-2026-4686.html"/>
<reference source="CVE" ref_id="CVE-2026-4687" ref_url="https://linux.oracle.com/cve/CVE-2026-4687.html"/>
<reference source="CVE" ref_id="CVE-2026-4688" ref_url="https://linux.oracle.com/cve/CVE-2026-4688.html"/>
<reference source="CVE" ref_id="CVE-2026-4689" ref_url="https://linux.oracle.com/cve/CVE-2026-4689.html"/>
<reference source="CVE" ref_id="CVE-2026-4690" ref_url="https://linux.oracle.com/cve/CVE-2026-4690.html"/>
<reference source="CVE" ref_id="CVE-2026-4691" ref_url="https://linux.oracle.com/cve/CVE-2026-4691.html"/>
<reference source="CVE" ref_id="CVE-2026-4692" ref_url="https://linux.oracle.com/cve/CVE-2026-4692.html"/>
<reference source="CVE" ref_id="CVE-2026-4693" ref_url="https://linux.oracle.com/cve/CVE-2026-4693.html"/>
<reference source="CVE" ref_id="CVE-2026-4694" ref_url="https://linux.oracle.com/cve/CVE-2026-4694.html"/>
<reference source="CVE" ref_id="CVE-2026-4695" ref_url="https://linux.oracle.com/cve/CVE-2026-4695.html"/>
<reference source="CVE" ref_id="CVE-2026-4696" ref_url="https://linux.oracle.com/cve/CVE-2026-4696.html"/>
<reference source="CVE" ref_id="CVE-2026-4697" ref_url="https://linux.oracle.com/cve/CVE-2026-4697.html"/>
<reference source="CVE" ref_id="CVE-2026-4698" ref_url="https://linux.oracle.com/cve/CVE-2026-4698.html"/>
<reference source="CVE" ref_id="CVE-2026-4699" ref_url="https://linux.oracle.com/cve/CVE-2026-4699.html"/>
<reference source="CVE" ref_id="CVE-2026-4700" ref_url="https://linux.oracle.com/cve/CVE-2026-4700.html"/>
<reference source="CVE" ref_id="CVE-2026-4701" ref_url="https://linux.oracle.com/cve/CVE-2026-4701.html"/>
<reference source="CVE" ref_id="CVE-2026-4702" ref_url="https://linux.oracle.com/cve/CVE-2026-4702.html"/>
<reference source="CVE" ref_id="CVE-2026-4704" ref_url="https://linux.oracle.com/cve/CVE-2026-4704.html"/>
<reference source="CVE" ref_id="CVE-2026-4705" ref_url="https://linux.oracle.com/cve/CVE-2026-4705.html"/>
<reference source="CVE" ref_id="CVE-2026-4706" ref_url="https://linux.oracle.com/cve/CVE-2026-4706.html"/>
<reference source="CVE" ref_id="CVE-2026-4707" ref_url="https://linux.oracle.com/cve/CVE-2026-4707.html"/>
<reference source="CVE" ref_id="CVE-2026-4708" ref_url="https://linux.oracle.com/cve/CVE-2026-4708.html"/>
<reference source="CVE" ref_id="CVE-2026-4709" ref_url="https://linux.oracle.com/cve/CVE-2026-4709.html"/>
<reference source="CVE" ref_id="CVE-2026-4710" ref_url="https://linux.oracle.com/cve/CVE-2026-4710.html"/>
<reference source="CVE" ref_id="CVE-2026-4711" ref_url="https://linux.oracle.com/cve/CVE-2026-4711.html"/>
<reference source="CVE" ref_id="CVE-2026-4712" ref_url="https://linux.oracle.com/cve/CVE-2026-4712.html"/>
<reference source="CVE" ref_id="CVE-2026-4713" ref_url="https://linux.oracle.com/cve/CVE-2026-4713.html"/>
<reference source="CVE" ref_id="CVE-2026-4714" ref_url="https://linux.oracle.com/cve/CVE-2026-4714.html"/>
<reference source="CVE" ref_id="CVE-2026-4715" ref_url="https://linux.oracle.com/cve/CVE-2026-4715.html"/>
<reference source="CVE" ref_id="CVE-2026-4716" ref_url="https://linux.oracle.com/cve/CVE-2026-4716.html"/>
<reference source="CVE" ref_id="CVE-2026-4717" ref_url="https://linux.oracle.com/cve/CVE-2026-4717.html"/>
<reference source="CVE" ref_id="CVE-2026-4718" ref_url="https://linux.oracle.com/cve/CVE-2026-4718.html"/>
<reference source="CVE" ref_id="CVE-2026-4719" ref_url="https://linux.oracle.com/cve/CVE-2026-4719.html"/>
<reference source="CVE" ref_id="CVE-2026-4720" ref_url="https://linux.oracle.com/cve/CVE-2026-4720.html"/>
<reference source="CVE" ref_id="CVE-2026-4721" ref_url="https://linux.oracle.com/cve/CVE-2026-4721.html"/>

<description>
[140.9.0-1.0.1]
- Fix prefs for new nss [Orabug: 37079820]
- Add Oracle prefs file

[140.9.0]
- Add OpenELA debranding

[140.9.0-1]
- Update to 140.9.0 ESR
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>IMPORTANT</severity>
<rights>Copyright 2026 Oracle, Inc.</rights>
<issued date="2026-04-07"/>
<cve cvss3="5.4/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-3889.html" public="20260324">CVE-2026-3889</cve>
<cve cvss3="8.2/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4371.html" public="20260324">CVE-2026-4371</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4684.html" public="20260324">CVE-2026-4684</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4685.html" public="20260324">CVE-2026-4685</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4686.html" public="20260324">CVE-2026-4686</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4687.html" public="20260324">CVE-2026-4687</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4688.html" public="20260324">CVE-2026-4688</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4689.html" public="20260324">CVE-2026-4689</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4690.html" public="20260324">CVE-2026-4690</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4691.html" public="20260324">CVE-2026-4691</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4692.html" public="20260324">CVE-2026-4692</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4693.html" public="20260324">CVE-2026-4693</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4694.html" public="20260324">CVE-2026-4694</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4695.html" public="20260324">CVE-2026-4695</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4696.html" public="20260324">CVE-2026-4696</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4697.html" public="20260324">CVE-2026-4697</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4698.html" public="20260324">CVE-2026-4698</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4699.html" public="20260324">CVE-2026-4699</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4700.html" public="20260324">CVE-2026-4700</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4701.html" public="20260324">CVE-2026-4701</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4702.html" public="20260324">CVE-2026-4702</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4704.html" public="20260324">CVE-2026-4704</cve>
<cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4705.html" public="20260324">CVE-2026-4705</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4706.html" public="20260324">CVE-2026-4706</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4707.html" public="20260324">CVE-2026-4707</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4708.html" public="20260324">CVE-2026-4708</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4709.html" public="20260324">CVE-2026-4709</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4710.html" public="20260324">CVE-2026-4710</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4711.html" public="20260324">CVE-2026-4711</cve>
<cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-4712.html" public="20260324">CVE-2026-4712</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4713.html" public="20260324">CVE-2026-4713</cve>
<cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2026-4714.html" public="20260324">CVE-2026-4714</cve>
<cve cvss3="6.5/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-4715.html" public="20260324">CVE-2026-4715</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4716.html" public="20260324">CVE-2026-4716</cve>
<cve cvss3="6.1/CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" href="https://linux.oracle.com/cve/CVE-2026-4717.html" public="20260324">CVE-2026-4717</cve>
<cve cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-4718.html" public="20260324">CVE-2026-4718</cve>
<cve cvss3="3.4/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2026-4719.html" public="20260324">CVE-2026-4719</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4720.html" public="20260324">CVE-2026-4720</cve>
<cve cvss3="7.5/CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2026-4721.html" public="20260324">CVE-2026-4721</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:8::appstream</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20266917001" comment="Oracle Linux 8 is installed"/>
<criteria operator="OR">
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20266917002" comment="Oracle Linux arch is aarch64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20266917003" comment="thunderbird is earlier than 0:140.9.0-1.0.1.el8_10"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20266917004" comment="thunderbird is signed with the Oracle Linux 8 key"/>
</criteria>
</criteria>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20266917005" comment="Oracle Linux arch is x86_64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20266917003" comment="thunderbird is earlier than 0:140.9.0-1.0.1.el8_10"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20266917004" comment="thunderbird is signed with the Oracle Linux 8 key"/>
</criteria>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20266917001"  version="501" comment="Oracle Linux 8 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20266917001" />
<state state_ref="oval:com.oracle.elsa:ste:20266917002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20266917002"  version="501" comment="Oracle Linux arch is aarch64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20266917001" />
<state state_ref="oval:com.oracle.elsa:ste:20266917003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20266917003"  version="501" comment="thunderbird is earlier than 0:140.9.0-1.0.1.el8_10" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20266917002" />
<state state_ref="oval:com.oracle.elsa:ste:20266917004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20266917004"  version="501" comment="thunderbird is signed with the Oracle Linux 8 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20266917002" />
<state state_ref="oval:com.oracle.elsa:ste:20266917001" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20266917005"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20266917001" />
<state state_ref="oval:com.oracle.elsa:ste:20266917005" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20266917002" version="501">
<name>thunderbird</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20266917001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>
</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20266917001" version="501">
<signature_keyid operation="equals">82562ea9ad986da3</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20266917002" version="501">
<version operation="pattern match">^8</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20266917003" version="501">
<arch operation="pattern match">aarch64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20266917004" version="501">
<evr datatype="evr_string" operation="less than">0:140.9.0-1.0.1.el8_10</evr>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20266917005" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>

</states>
</oval_definitions>
