https://access.redhat.com/security/updates/classification/#important
https://bugzilla.redhat.com/show_bug.cgi?id=2450710
https://bugzilla.redhat.com/show_bug.cgi?id=2450711
https://bugzilla.redhat.com/show_bug.cgi?id=2450712
https://bugzilla.redhat.com/show_bug.cgi?id=2450713
https://bugzilla.redhat.com/show_bug.cgi?id=2450714
https://bugzilla.redhat.com/show_bug.cgi?id=2450715
https://bugzilla.redhat.com/show_bug.cgi?id=2450718
https://bugzilla.redhat.com/show_bug.cgi?id=2450719
https://bugzilla.redhat.com/show_bug.cgi?id=2450720
https://bugzilla.redhat.com/show_bug.cgi?id=2450721
https://bugzilla.redhat.com/show_bug.cgi?id=2450722
https://bugzilla.redhat.com/show_bug.cgi?id=2450723
https://bugzilla.redhat.com/show_bug.cgi?id=2450724
https://bugzilla.redhat.com/show_bug.cgi?id=2450725
https://bugzilla.redhat.com/show_bug.cgi?id=2450726
https://bugzilla.redhat.com/show_bug.cgi?id=2450727
https://bugzilla.redhat.com/show_bug.cgi?id=2450728
https://bugzilla.redhat.com/show_bug.cgi?id=2450729
https://bugzilla.redhat.com/show_bug.cgi?id=2450730
https://bugzilla.redhat.com/show_bug.cgi?id=2450732
https://bugzilla.redhat.com/show_bug.cgi?id=2450733
https://bugzilla.redhat.com/show_bug.cgi?id=2450734
https://bugzilla.redhat.com/show_bug.cgi?id=2450735
https://bugzilla.redhat.com/show_bug.cgi?id=2450738
https://bugzilla.redhat.com/show_bug.cgi?id=2450739
https://bugzilla.redhat.com/show_bug.cgi?id=2450740
https://bugzilla.redhat.com/show_bug.cgi?id=2450741
https://bugzilla.redhat.com/show_bug.cgi?id=2450742
https://bugzilla.redhat.com/show_bug.cgi?id=2450744
https://bugzilla.redhat.com/show_bug.cgi?id=2450746
https://bugzilla.redhat.com/show_bug.cgi?id=2450747
https://bugzilla.redhat.com/show_bug.cgi?id=2450748
https://bugzilla.redhat.com/show_bug.cgi?id=2450751
https://bugzilla.redhat.com/show_bug.cgi?id=2450752
https://bugzilla.redhat.com/show_bug.cgi?id=2450755
https://bugzilla.redhat.com/show_bug.cgi?id=2450756
https://bugzilla.redhat.com/show_bug.cgi?id=2450757
Severity: Critical
ID: 303805
File Name: redhat-RHSA-2026-5932.nasl
Version: 1.1
Type: local
Agent: unix
Family: Red Hat Local Security Checks
Published: 3/26/2026
Updated: 3/26/2026
Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Frictionless Assessment Azure, Nessus Agent, Nessus
Risk Factor: High
Score: 7.4
Vendor Severity: Important
Risk Factor: Critical
Base Score: 10
Temporal Score: 7.4
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2026-4717
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
CVSS Score Source: CVE-2026-4692
CPE: cpe:/o:redhat:rhel_eus:8.10, cpe:/o:redhat:enterprise_linux:8, p-cpe:/a:redhat:enterprise_linux:firefox
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 3/26/2026
Vulnerability Publication Date: 3/4/2026
CVE: CVE-2026-4684, CVE-2026-4685, CVE-2026-4686, CVE-2026-4687, CVE-2026-4688, CVE-2026-4689, CVE-2026-4690, CVE-2026-4691, CVE-2026-4692, CVE-2026-4693, CVE-2026-4694, CVE-2026-4695, CVE-2026-4696, CVE-2026-4697, CVE-2026-4698, CVE-2026-4699, CVE-2026-4700, CVE-2026-4701, CVE-2026-4702, CVE-2026-4704, CVE-2026-4705, CVE-2026-4706, CVE-2026-4707, CVE-2026-4708, CVE-2026-4709, CVE-2026-4710, CVE-2026-4711, CVE-2026-4712, CVE-2026-4713, CVE-2026-4714, CVE-2026-4715, CVE-2026-4716, CVE-2026-4717, CVE-2026-4718, CVE-2026-4719, CVE-2026-4720, CVE-2026-4721