<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaFirefox-110.0.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12753</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaFirefox-110.0.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaFirefox-110.0.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12753</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:12753</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-0767/</URL>
      <Description>SUSE CVE CVE-2023-0767 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25728/</URL>
      <Description>SUSE CVE CVE-2023-25728 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25729/</URL>
      <Description>SUSE CVE CVE-2023-25729 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25730/</URL>
      <Description>SUSE CVE CVE-2023-25730 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25731/</URL>
      <Description>SUSE CVE CVE-2023-25731 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25732/</URL>
      <Description>SUSE CVE CVE-2023-25732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25733/</URL>
      <Description>SUSE CVE CVE-2023-25733 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25734/</URL>
      <Description>SUSE CVE CVE-2023-25734 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25735/</URL>
      <Description>SUSE CVE CVE-2023-25735 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25736/</URL>
      <Description>SUSE CVE CVE-2023-25736 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25737/</URL>
      <Description>SUSE CVE CVE-2023-25737 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25738/</URL>
      <Description>SUSE CVE CVE-2023-25738 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25739/</URL>
      <Description>SUSE CVE CVE-2023-25739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25740/</URL>
      <Description>SUSE CVE CVE-2023-25740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25741/</URL>
      <Description>SUSE CVE CVE-2023-25741 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25742/</URL>
      <Description>SUSE CVE CVE-2023-25742 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25743/</URL>
      <Description>SUSE CVE CVE-2023-25743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25744/</URL>
      <Description>SUSE CVE CVE-2023-25744 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-25745/</URL>
      <Description>SUSE CVE CVE-2023-25745 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-110.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-110.0.1-1.1">MozillaFirefox-110.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-110.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-110.0.1-1.1">MozillaFirefox-branding-upstream-110.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-110.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-devel-110.0.1-1.1">MozillaFirefox-devel-110.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-110.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-110.0.1-1.1">MozillaFirefox-translations-common-110.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-110.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-110.0.1-1.1">MozillaFirefox-translations-other-110.0.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-110.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1">MozillaFirefox-110.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-110.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1">MozillaFirefox-branding-upstream-110.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-110.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1">MozillaFirefox-devel-110.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-110.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1">MozillaFirefox-translations-common-110.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-110.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1">MozillaFirefox-translations-other-110.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-0767</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-0767.html</URL>
        <Description>CVE-2023-0767</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1208138</URL>
        <Description>SUSE Bug 1208138</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213200</URL>
        <Description>SUSE Bug 1213200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1213818</URL>
        <Description>SUSE Bug 1213818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1214271</URL>
        <Description>SUSE Bug 1214271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218481</URL>
        <Description>SUSE Bug 1218481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1218964</URL>
        <Description>SUSE Bug 1218964</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The &lt;code&gt;Content-Security-Policy-Report-Only&lt;/code&gt; header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25728</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25728.html</URL>
        <Description>CVE-2023-25728</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Permission prompts for opening external schemes were only shown for &lt;code&gt;ContentPrincipals&lt;/code&gt; resulting in extensions being able to open them without user interaction via &lt;code&gt;ExpandedPrincipals&lt;/code&gt;. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25729</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25729.html</URL>
        <Description>CVE-2023-25729</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A background script invoking &lt;code&gt;requestFullscreen&lt;/code&gt; and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25730</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25730.html</URL>
        <Description>CVE-2023-25730</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to URL previews in the network panel of developer tools improperly storing URLs, query parameters could potentially be used to overwrite global objects in privileged code. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25731</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25731.html</URL>
        <Description>CVE-2023-25731</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When encoding data from an &lt;code&gt;inputStream&lt;/code&gt; in &lt;code&gt;xpcom&lt;/code&gt; the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25732.html</URL>
        <Description>CVE-2023-25732</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The return value from `gfx::SourceSurfaceSkia::Map()` wasn't being verified which could have potentially lead to a null pointer dereference. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25733</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25733.html</URL>
        <Description>CVE-2023-25733</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">After downloading a Windows &lt;code&gt;.url&lt;/code&gt; shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.&lt;br&gt;*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25734</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25734.html</URL>
        <Description>CVE-2023-25734</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25735</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25735.html</URL>
        <Description>CVE-2023-25735</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid downcast from `nsHTMLDocument` to `nsIContent` could have lead to undefined behavior. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25736</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25736.html</URL>
        <Description>CVE-2023-25736</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid downcast from &lt;code&gt;nsTextNode&lt;/code&gt; to &lt;code&gt;SVGElement&lt;/code&gt; could have lead to undefined behavior. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25737</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25737.html</URL>
        <Description>CVE-2023-25737</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Members of the &lt;code&gt;DEVMODEW&lt;/code&gt; struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.&lt;br&gt;*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25738</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25738.html</URL>
        <Description>CVE-2023-25738</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in &lt;code&gt;ScriptLoadContext&lt;/code&gt;. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25739.html</URL>
        <Description>CVE-2023-25739</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">After downloading a Windows &lt;code&gt;.scf&lt;/code&gt; script from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.&lt;br&gt;*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25740.html</URL>
        <Description>CVE-2023-25740</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When dragging and dropping an image cross-origin, the image's size could potentially be leaked. This behavior was shipped in 109 and caused web compatibility problems as well as this security concern, so the behavior was disabled until further review. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25741</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25741.html</URL>
        <Description>CVE-2023-25741</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox &lt; 110, Thunderbird &lt; 102.8, and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25742</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25742.html</URL>
        <Description>CVE-2023-25742</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A lack of in app notification for entering fullscreen mode could have lead to a malicious website spoofing browser chrome.&lt;br&gt;*This bug only affects Firefox Focus. Other versions of Firefox are unaffected.*. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25743.html</URL>
        <Description>CVE-2023-25743</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers Kershaw Chang and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 110 and Firefox ESR &lt; 102.8.</Note>
    </Notes>
    <CVE>CVE-2023-25744</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25744.html</URL>
        <Description>CVE-2023-25744</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers Timothy Nikkel, Gabriele Svelto, Jeff Muizelaar and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 109. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 110.</Note>
    </Notes>
    <CVE>CVE-2023-25745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-110.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-110.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-25745.html</URL>
        <Description>CVE-2023-25745</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
