{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud 9","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:OpenStack Cloud Crowbar 9","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20OpenStack%20Cloud%20Crowbar%209"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP4","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP4"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP2-BCL","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP2-BCL"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP4-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP4-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"102.7.0-112.145.1","MozillaFirefox-devel":"102.7.0-112.145.1","MozillaFirefox-translations-common":"102.7.0-112.145.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"102.7.0-112.145.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\n- Updated to version 102.7.0 ESR (bsc#1207119):\n  - CVE-2022-46871: Updated an out of date library (libusrsctp) which\n    contained several vulnerabilities.\n  - CVE-2023-23598: Fixed an arbitrary file read from GTK drag and\n    drop on Linux.\n  - CVE-2023-23601: Fixed a potential spoofing attack when dragging a\n    URL from a cross-origin iframe into the same tab.\n  - CVE-2023-23602: Fixed a mishandled security check, which caused\n    the Content Security Policy header to be ignored for WebSockets\n    in WebWorkers.\n  - CVE-2022-46877: Fixed a fullscreen notification bypass which\n    could be leveraged in spoofing attacks.\n  - CVE-2023-23603: Fixed a Content Security Policy bypass via format\n    directives.\n  - CVE-2023-23605: Fixed several memory safety bugs.\n","id":"SUSE-SU-2023:0111-1","modified":"2023-01-20T09:19:36Z","published":"2023-01-20T09:19:36Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2023/suse-su-20230111-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1207119"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-46871"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2022-46877"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23598"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23601"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23602"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23603"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-23605"}],"related":["CVE-2022-46871","CVE-2022-46877","CVE-2023-23598","CVE-2023-23601","CVE-2023-23602","CVE-2023-23603","CVE-2023-23605"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2022-46871","CVE-2022-46877","CVE-2023-23598","CVE-2023-23601","CVE-2023-23602","CVE-2023-23603","CVE-2023-23605"]}