{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"115.9.0-112.203.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.9.0-112.203.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.9.0-112.203.2","MozillaFirefox-devel":"115.9.0-112.203.2","MozillaFirefox-translations-common":"115.9.0-112.203.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.9.0-112.203.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"115.9.0-112.203.2","MozillaFirefox-devel":"115.9.0-112.203.2","MozillaFirefox-translations-common":"115.9.0-112.203.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"115.9.0-112.203.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nFirefox Extended Support Release 115.9.0 ESR (bsc#1221327):\n\n- CVE-2024-0743: Crash in NSS TLS method (bmo#1867408).    \n- CVE-2024-2605: Windows Error Reporter could be used as a Sandbox escape\n    vector (bmo#1872920).\n- CVE-2024-2607: JIT code failed to save return registers on Armv7-A (bmo#1879939).\n- CVE-2024-2608: Integer overflow could have led to out of bounds write (bmo#1880692).\n- CVE-2024-2616: Improve handling of out-of-memory conditions in ICU (bmo#1846197).\n- CVE-2023-5388: NSS susceptible to timing attack against RSA decryption (bmo#1780432).\n- CVE-2024-2610: Improper handling of html and body tags enabled CSP nonce\n    leakage (bmo#1871112).\n- CVE-2024-2611: Clickjacking vulnerability could have led to a user\n    accidentally granting permissions (bmo#1876675).\n- CVE-2024-2612: Self referencing object could have potentially led to a use-\n    after-free (bmo#1879444).\n- CVE-2024-2614: Memory safety bugs fixed in Firefox 124, Firefox ESR 115.9,\n    and Thunderbird 115.9 (bmo#1685358, bmo#1861016, bmo#1880405,\n    bmo#1881093).\n","id":"SUSE-SU-2024:0971-1","modified":"2024-03-22T10:15:04Z","published":"2024-03-22T10:15:04Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20240971-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1221327"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2023-5388"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-0743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2605"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2607"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2608"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2610"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2611"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2612"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2614"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-2616"}],"related":["CVE-2023-5388","CVE-2024-0743","CVE-2024-2605","CVE-2024-2607","CVE-2024-2608","CVE-2024-2610","CVE-2024-2611","CVE-2024-2612","CVE-2024-2614","CVE-2024-2616"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2023-5388","CVE-2024-0743","CVE-2024-2605","CVE-2024-2607","CVE-2024-2608","CVE-2024-2610","CVE-2024-2611","CVE-2024-2612","CVE-2024-2614","CVE-2024-2616"]}