{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-ESPOS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-ESPOS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-ESPOS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise High Performance Computing 15 SP1-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20High%20Performance%20Computing%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-BCL","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 15 SP1-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2015%20SP1-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 15 SP1","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2015%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.5.0-150000.150.65.1","MozillaFirefox-devel":"102.5.0-150000.150.65.1","MozillaFirefox-translations-common":"102.5.0-150000.150.65.1","MozillaFirefox-translations-other":"102.5.0-150000.150.65.1"}]},"package":{"ecosystem":"SUSE:Enterprise Storage 6","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Enterprise%20Storage%206"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.5.0-150000.150.65.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 102.5.0 ESR (MFSA 2022-48, bsc#1205270):\n\n- CVE-2022-45403: Service Workers might have learned size of cross-origin media files\n- CVE-2022-45404: Fullscreen notification bypass\n- CVE-2022-45405: Use-after-free in InputStream implementation\n- CVE-2022-45406: Use-after-free of a JavaScript Realm\n- CVE-2022-45408: Fullscreen notification bypass via windowName\n- CVE-2022-45409: Use-after-free in Garbage Collection\n- CVE-2022-45410: ServiceWorker-intercepted requests bypassed SameSite cookie policy\n- CVE-2022-45411: Cross-Site Tracing was possible via non-standard override headers\n- CVE-2022-45412: Symlinks may resolve to partially uninitialized buffers\n- CVE-2022-45416: Keystroke Side-Channel Leakage\n- CVE-2022-45418: Custom mouse cursor could have been drawn over browser UI\n- CVE-2022-45420: Iframe contents could be rendered outside the iframe\n- CVE-2022-45421: Memory safety bugs fixed in Firefox 107 and Firefox ESR 102.5\n","id":"SUSE-SU-2022:4083-1","modified":"2022-11-18T14:46:03Z","published":"2022-11-18T14:46:03Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2022/suse-su-20224083-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1205270"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45403"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45404"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45405"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45406"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45408"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45409"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45410"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45411"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45412"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45416"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45418"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45420"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-45421"}],"related":["CVE-2022-45403","CVE-2022-45404","CVE-2022-45405","CVE-2022-45406","CVE-2022-45408","CVE-2022-45409","CVE-2022-45410","CVE-2022-45411","CVE-2022-45412","CVE-2022-45416","CVE-2022-45418","CVE-2022-45420","CVE-2022-45421"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2022-45403","CVE-2022-45404","CVE-2022-45405","CVE-2022-45406","CVE-2022-45408","CVE-2022-45409","CVE-2022-45410","CVE-2022-45411","CVE-2022-45412","CVE-2022-45416","CVE-2022-45418","CVE-2022-45420","CVE-2022-45421"]}