{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"115.8.0-112.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.8.0-112.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.8.0-112.200.1","MozillaFirefox-devel":"115.8.0-112.200.1","MozillaFirefox-translations-common":"115.8.0-112.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.8.0-112.200.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.8.0-112.200.1","MozillaFirefox-devel":"115.8.0-112.200.1","MozillaFirefox-translations-common":"115.8.0-112.200.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.8.0-112.200.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 115.8.0 ESR (MFSA 2024-06) (bsc#1220048):\n\n- CVE-2024-1546: Out-of-bounds memory read in networking channels\n- CVE-2024-1547: Alert dialog could have been spoofed on another site\n- CVE-2024-1548: Fullscreen Notification could have been hidden by select element\n- CVE-2024-1549: Custom cursor could obscure the permission dialog\n- CVE-2024-1550: Mouse cursor re-positioned unexpectedly could have led to unintended permission grants\n- CVE-2024-1551: Multipart HTTP Responses would accept the Set-Cookie header in response parts\n- CVE-2024-1552: Incorrect code generation on 32-bit ARM devices\n- CVE-2024-1553: Memory safety bugs fixed in Firefox 123, Firefox ESR 115.8, and Thunderbird 115.8\n\n- Recommend libfido2-udev on codestreams that exist, in order to try\n  to get security keys (e.g. Yubikeys) work out of the box. (bsc#1184272)\n","id":"SUSE-SU-2024:0580-1","modified":"2024-02-21T11:57:29Z","published":"2024-02-21T11:57:29Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240580-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1184272"},{"type":"REPORT","url":"https://bugzilla.suse.com/1220048"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1546"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1547"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1548"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1549"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1550"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1551"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1552"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-1553"}],"related":["CVE-2024-1546","CVE-2024-1547","CVE-2024-1548","CVE-2024-1549","CVE-2024-1550","CVE-2024-1551","CVE-2024-1552","CVE-2024-1553"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2024-1546","CVE-2024-1547","CVE-2024-1548","CVE-2024-1549","CVE-2024-1550","CVE-2024-1551","CVE-2024-1552","CVE-2024-1553"]}