<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaFirefox-103.0.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12227-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaFirefox-103.0.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaFirefox-103.0.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12227</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-2505/</URL>
      <Description>SUSE CVE CVE-2022-2505 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36314/</URL>
      <Description>SUSE CVE CVE-2022-36314 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36315/</URL>
      <Description>SUSE CVE CVE-2022-36315 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36316/</URL>
      <Description>SUSE CVE CVE-2022-36316 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36317/</URL>
      <Description>SUSE CVE CVE-2022-36317 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36318/</URL>
      <Description>SUSE CVE CVE-2022-36318 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36319/</URL>
      <Description>SUSE CVE CVE-2022-36319 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2022-36320/</URL>
      <Description>SUSE CVE CVE-2022-36320 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-103.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-103.0.1-1.1">MozillaFirefox-103.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-103.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-103.0.1-1.1">MozillaFirefox-branding-upstream-103.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-103.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-devel-103.0.1-1.1">MozillaFirefox-devel-103.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-103.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-103.0.1-1.1">MozillaFirefox-translations-common-103.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-103.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-103.0.1-1.1">MozillaFirefox-translations-other-103.0.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-103.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1">MozillaFirefox-103.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-103.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1">MozillaFirefox-branding-upstream-103.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-103.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1">MozillaFirefox-devel-103.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-103.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1">MozillaFirefox-translations-common-103.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-103.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1">MozillaFirefox-translations-other-103.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 102.1, Firefox &lt; 103, and Thunderbird &lt; 102.1.</Note>
    </Notes>
    <CVE>CVE-2022-2505</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-2505.html</URL>
        <Description>CVE-2022-2505</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.&lt;br&gt;This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR &lt; 102.1, Firefox &lt; 103, and Thunderbird &lt; 102.1.</Note>
    </Notes>
    <CVE>CVE-2022-36314</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36314.html</URL>
        <Description>CVE-2022-36314</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox &lt; 103.</Note>
    </Notes>
    <CVE>CVE-2022-36315</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36315.html</URL>
        <Description>CVE-2022-36315</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox &lt; 103.</Note>
    </Notes>
    <CVE>CVE-2022-36316</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36316.html</URL>
        <Description>CVE-2022-36316</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.&lt;br&gt;*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 103.</Note>
    </Notes>
    <CVE>CVE-2022-36317</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36317.html</URL>
        <Description>CVE-2022-36317</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.</Note>
    </Notes>
    <CVE>CVE-2022-36318</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36318.html</URL>
        <Description>CVE-2022-36318</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR &lt; 102.1, Firefox ESR &lt; 91.12, Firefox &lt; 103, Thunderbird &lt; 102.1, and Thunderbird &lt; 91.12.</Note>
    </Notes>
    <CVE>CVE-2022-36319</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36319.html</URL>
        <Description>CVE-2022-36319</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 103.</Note>
    </Notes>
    <CVE>CVE-2022-36320</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2022-36320.html</URL>
        <Description>CVE-2022-36320</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
