<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaFirefox-113.0-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:12920-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaFirefox-113.0-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaFirefox-113.0-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-12920</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32205/</URL>
      <Description>SUSE CVE CVE-2023-32205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32206/</URL>
      <Description>SUSE CVE CVE-2023-32206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32207/</URL>
      <Description>SUSE CVE CVE-2023-32207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32208/</URL>
      <Description>SUSE CVE CVE-2023-32208 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32209/</URL>
      <Description>SUSE CVE CVE-2023-32209 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32210/</URL>
      <Description>SUSE CVE CVE-2023-32210 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32211/</URL>
      <Description>SUSE CVE CVE-2023-32211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32212/</URL>
      <Description>SUSE CVE CVE-2023-32212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32213/</URL>
      <Description>SUSE CVE CVE-2023-32213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32214/</URL>
      <Description>SUSE CVE CVE-2023-32214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32215/</URL>
      <Description>SUSE CVE CVE-2023-32215 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32216/</URL>
      <Description>SUSE CVE CVE-2023-32216 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-113.0-1.1">
      <FullProductName ProductID="MozillaFirefox-113.0-1.1">MozillaFirefox-113.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-113.0-1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-113.0-1.1">MozillaFirefox-branding-upstream-113.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-113.0-1.1">
      <FullProductName ProductID="MozillaFirefox-devel-113.0-1.1">MozillaFirefox-devel-113.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-113.0-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-113.0-1.1">MozillaFirefox-translations-common-113.0-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-113.0-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-113.0-1.1">MozillaFirefox-translations-other-113.0-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-113.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-113.0-1.1">MozillaFirefox-113.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-113.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1">MozillaFirefox-branding-upstream-113.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-113.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1">MozillaFirefox-devel-113.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-113.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1">MozillaFirefox-translations-common-113.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-113.0-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1">MozillaFirefox-translations-other-113.0-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32205.html</URL>
        <Description>CVE-2023-32205</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32206.html</URL>
        <Description>CVE-2023-32206</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32207.html</URL>
        <Description>CVE-2023-32207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Service workers could reveal script base URL due to dynamic `import()`. This vulnerability affects Firefox &lt; 113.</Note>
    </Notes>
    <CVE>CVE-2023-32208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32208.html</URL>
        <Description>CVE-2023-32208</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A maliciously crafted favicon could have led to an out of memory crash. This vulnerability affects Firefox &lt; 113.</Note>
    </Notes>
    <CVE>CVE-2023-32209</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32209.html</URL>
        <Description>CVE-2023-32209</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Documents were incorrectly assuming an ordering of principal objects when ensuring we were loading an appropriately privileged principal. In certain circumstances it might have been possible to cause a document to be loaded with a higher privileged principal than intended. This vulnerability affects Firefox &lt; 113.</Note>
    </Notes>
    <CVE>CVE-2023-32210</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32210.html</URL>
        <Description>CVE-2023-32210</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32211.html</URL>
        <Description>CVE-2023-32211</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could have positioned a &lt;code&gt;datalist&lt;/code&gt; element to obscure the address bar. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32212.html</URL>
        <Description>CVE-2023-32212</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32213.html</URL>
        <Description>CVE-2023-32213</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.
*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32214.html</URL>
        <Description>CVE-2023-32214</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32215.html</URL>
        <Description>CVE-2023-32215</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety  bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 113.

</Note>
    </Notes>
    <CVE>CVE-2023-32216</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-113.0-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-113.0-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32216.html</URL>
        <Description>CVE-2023-32216</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
