<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">MozillaFirefox-124.0.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:13795-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-15T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-15T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-15T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">MozillaFirefox-124.0.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the MozillaFirefox-124.0.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-13795</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5388/</URL>
      <Description>SUSE CVE CVE-2023-5388 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2605/</URL>
      <Description>SUSE CVE CVE-2024-2605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2606/</URL>
      <Description>SUSE CVE CVE-2024-2606 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2607/</URL>
      <Description>SUSE CVE CVE-2024-2607 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2608/</URL>
      <Description>SUSE CVE CVE-2024-2608 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2609/</URL>
      <Description>SUSE CVE CVE-2024-2609 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2610/</URL>
      <Description>SUSE CVE CVE-2024-2610 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2611/</URL>
      <Description>SUSE CVE CVE-2024-2611 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2612/</URL>
      <Description>SUSE CVE CVE-2024-2612 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2613/</URL>
      <Description>SUSE CVE CVE-2024-2613 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2614/</URL>
      <Description>SUSE CVE CVE-2024-2614 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-2615/</URL>
      <Description>SUSE CVE CVE-2024-2615 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-29943/</URL>
      <Description>SUSE CVE CVE-2024-29943 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2024-29944/</URL>
      <Description>SUSE CVE CVE-2024-29944 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-124.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-124.0.1-1.1">MozillaFirefox-124.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-124.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-124.0.1-1.1">MozillaFirefox-branding-upstream-124.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-124.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-devel-124.0.1-1.1">MozillaFirefox-devel-124.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-124.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-124.0.1-1.1">MozillaFirefox-translations-common-124.0.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-124.0.1-1.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-124.0.1-1.1">MozillaFirefox-translations-other-124.0.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-124.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1">MozillaFirefox-124.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-124.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1">MozillaFirefox-branding-upstream-124.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-124.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1">MozillaFirefox-devel-124.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-124.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1">MozillaFirefox-translations-common-124.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-124.0.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1">MozillaFirefox-translations-other-124.0.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NSS was susceptible to a timing side-channel attack when performing RSA decryption. This attack could potentially allow an attacker to recover the private data. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2023-5388</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5388.html</URL>
        <Description>CVE-2023-5388</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1216198</URL>
        <Description>SUSE Bug 1216198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could have leveraged the Windows Error Reporter to run arbitrary code on the system escaping the sandbox. *Note:* This issue only affected Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2605.html</URL>
        <Description>CVE-2024-2605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Passing invalid data could have led to invalid wasm values being created, such as arbitrary integers turning into pointer values. This vulnerability affects Firefox &lt; 124.</Note>
    </Notes>
    <CVE>CVE-2024-2606</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2606.html</URL>
        <Description>CVE-2024-2606</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Return registers were overwritten which could have allowed an attacker to execute arbitrary code. *Note:* This issue only affected Armv7-A systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2607</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2607.html</URL>
        <Description>CVE-2024-2607</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">`AppendEncodedAttributeValue(), ExtraSpaceNeededForAttrEncoding()` and `AppendEncodedCharacters()` could have experienced integer overflows, causing underallocation of an output buffer leading to an out of bounds write. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2608</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2608.html</URL>
        <Description>CVE-2024-2608</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The permission prompt input delay could expire while the window is not in focus. This makes it vulnerable to clickjacking by malicious websites. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.10, and Thunderbird &lt; 115.10.</Note>
    </Notes>
    <CVE>CVE-2024-2609</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2609.html</URL>
        <Description>CVE-2024-2609</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Using a markup injection an attacker could have stolen nonce values. This could have been used to bypass strict content security policies. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2610</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2610.html</URL>
        <Description>CVE-2024-2610</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing delay on when pointer lock was used could have allowed a malicious page to trick a user into granting permissions. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2611</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2611.html</URL>
        <Description>CVE-2024-2611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If an attacker could find a way to trigger a particular code path in `SafeRefPtr`, it could have triggered a crash or potentially be leveraged to achieve code execution. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2612</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2612.html</URL>
        <Description>CVE-2024-2612</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Data was not properly sanitized when decoding a QUIC ACK frame; this could have led to unrestricted memory consumption and a crash. This vulnerability affects Firefox &lt; 124.</Note>
    </Notes>
    <CVE>CVE-2024-2613</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2613.html</URL>
        <Description>CVE-2024-2613</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 124, Firefox ESR &lt; 115.9, and Thunderbird &lt; 115.9.</Note>
    </Notes>
    <CVE>CVE-2024-2614</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2614.html</URL>
        <Description>CVE-2024-2614</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 123. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 124.</Note>
    </Notes>
    <CVE>CVE-2024-2615</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-2615.html</URL>
        <Description>CVE-2024-2615</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221327</URL>
        <Description>SUSE Bug 1221327</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker was able to perform an out-of-bounds read or write on a JavaScript object by fooling range-based bounds check elimination. This vulnerability affects Firefox &lt; 124.0.1.</Note>
    </Notes>
    <CVE>CVE-2024-29943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-29943.html</URL>
        <Description>CVE-2024-29943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221850</URL>
        <Description>SUSE Bug 1221850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker was able to inject an event handler into a privileged object that would allow arbitrary JavaScript execution in the parent process. Note: This vulnerability affects Desktop Firefox only, it does not affect mobile versions of Firefox. This vulnerability affects Firefox &lt; 124.0.1 and Firefox ESR &lt; 115.9.1.</Note>
    </Notes>
    <CVE>CVE-2024-29944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-branding-upstream-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-devel-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-common-124.0.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:MozillaFirefox-translations-other-124.0.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2024-29944.html</URL>
        <Description>CVE-2024-29944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1221850</URL>
        <Description>SUSE Bug 1221850</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
