| Name | CVE-2026-2447 |
| Description | Heap buffer overflow in libvpx. This vulnerability affects Firefox < 147.0.4, Firefox ESR < 140.7.1, Firefox ESR < 115.32.1, Thunderbird < 140.7.2, and Thunderbird < 147.0.2. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| firefox (PTS) | sid | 147.0.3-1 | vulnerable |
| firefox-esr (PTS) | bullseye | 115.14.0esr-1~deb11u1 | vulnerable |
| bullseye (security) | 140.7.0esr-1~deb11u1 | vulnerable | |
| bookworm | 128.14.0esr-1~deb12u1 | vulnerable | |
| bookworm (security) | 140.7.0esr-1~deb12u1 | vulnerable | |
| trixie | 140.4.0esr-1~deb13u1 | vulnerable | |
| trixie (security) | 140.7.0esr-1~deb13u1 | vulnerable | |
| forky, sid | 140.7.0esr-1 | vulnerable | |
| libvpx (PTS) | bullseye | 1.9.0-1+deb11u3 | vulnerable |
| bullseye (security) | 1.9.0-1+deb11u4 | vulnerable | |
| bookworm, bookworm (security) | 1.12.0-1+deb12u4 | vulnerable | |
| trixie | 1.15.0-2.1 | vulnerable | |
| forky, sid | 1.16.0-2 | vulnerable | |
| thunderbird (PTS) | bullseye | 1:115.12.0-1~deb11u1 | vulnerable |
| bullseye (security) | 1:140.7.1esr-1~deb11u1 | vulnerable | |
| bookworm | 1:140.6.0esr-1~deb12u1 | vulnerable | |
| bookworm (security) | 1:140.7.1esr-1~deb12u1 | vulnerable | |
| trixie | 1:140.6.0esr-1~deb13u1 | vulnerable | |
| trixie (security) | 1:140.7.1esr-1~deb13u1 | vulnerable | |
| forky, sid | 1:140.7.1esr-1 | vulnerable |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| firefox | source | (unstable) | (unfixed) | |||
| firefox-esr | source | (unstable) | (unfixed) | |||
| libvpx | source | (unstable) | (unfixed) | |||
| thunderbird | source | (unstable) | (unfixed) |
https://www.mozilla.org/en-US/security/advisories/mfsa2026-10/
https://www.mozilla.org/en-US/security/advisories/mfsa2026-11/