CVE-2026-4689
EUVD-2026-1480224.03.2026, 13:16
Sandbox escape due to incorrect boundary conditions, integer overflow in the XPCOM component. This vulnerability was fixed in Firefox 149, Firefox ESR 115.34, Firefox ESR 140.9, Thunderbird 149, and Thunderbird 140.9.
Affected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| mozilla | firefox_esr | 𝑥 < 115.34.0 |
| mozilla | firefox | 𝑥 < 149.0 |
| mozilla | firefox_esr | 128.0 ≤ 𝑥 < 140.9.0 |
| mozilla | thunderbird_esr | 𝑥 < 140.9.0 |
| mozilla | thunderbird | 𝑥 < 149.0 |
𝑥
= Vulnerable software versions
Debian Releases
Debian Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| firefox |
| ||||||||||||||||
| firefox-esr |
| ||||||||||||||||
| thunderbird |
|
openSUSE / SLES Releases
openSUSE Product | |||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| MozillaFirefox |
| ||||||||||||||||||||||
| MozillaFirefox-devel |
| ||||||||||||||||||||||
| MozillaFirefox-translations-common |
| ||||||||||||||||||||||
| MozillaFirefox-translations-other |
| ||||||||||||||||||||||
| MozillaThunderbird |
| ||||||||||||||||||||||
| MozillaThunderbird-translations-common |
| ||||||||||||||||||||||
| MozillaThunderbird-translations-other |
|
Red Hat Enterprise Linux Releases
Common Weakness Enumeration
- CWE-190 - Integer Overflow or WraparoundThe software performs a calculation that can produce an integer overflow or wraparound, when the logic assumes that the resulting value will always be larger than the original value. This can introduce other weaknesses when the calculation is used for resource management or execution control.
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')The program copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.
References