{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"128.3.0-112.228.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.3.0-112.228.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"128.3.0-112.228.1","MozillaFirefox-devel":"128.3.0-112.228.1","MozillaFirefox-translations-common":"128.3.0-112.228.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.3.0-112.228.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"128.3.0-112.228.1","MozillaFirefox-devel":"128.3.0-112.228.1","MozillaFirefox-translations-common":"128.3.0-112.228.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP5","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP5"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"128.3.0-112.228.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for MozillaFirefox fixes the following issues:\n\nUpdate to Firefox Extended Support Release 128.3.0 ESR (MFSA-2024-47, bsc#1230979):\n\n - CVE-2024-8900: Clipboard write permission bypass\n - CVE-2024-9392: Compromised content process can bypass site isolation\n - CVE-2024-9393: Cross-origin access to PDF contents through multipart responses\n - CVE-2024-9394: Cross-origin access to JSON contents through multipart responses\n - CVE-2024-9396: Potential memory corruption may occur when cloning certain objects\n - CVE-2024-9397: Potential directory upload bypass via clickjacking\n - CVE-2024-9398: External protocol handlers could be enumerated via popups\n - CVE-2024-9399: Specially crafted WebTransport requests could lead to denial of service\n - CVE-2024-9400: Potential memory corruption during JIT compilation\n - CVE-2024-9401: Memory safety bugs fixed in Firefox 131, Firefox ESR 115.16, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3\n - CVE-2024-9402: Memory safety bugs fixed in Firefox 131, Firefox ESR 128.3, Thunderbird 131, and Thunderbird 128.3 \n","id":"SUSE-SU-2024:3518-1","modified":"2024-10-03T13:04:32Z","published":"2024-10-03T13:04:32Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2024/suse-su-20243518-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1230979"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-8900"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9392"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9393"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9394"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9396"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9397"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9398"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9399"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9400"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9401"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2024-9402"}],"related":["CVE-2024-8900","CVE-2024-9392","CVE-2024-9393","CVE-2024-9394","CVE-2024-9396","CVE-2024-9397","CVE-2024-9398","CVE-2024-9399","CVE-2024-9400","CVE-2024-9401","CVE-2024-9402"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2024-8900","CVE-2024-9392","CVE-2024-9393","CVE-2024-9394","CVE-2024-9396","CVE-2024-9397","CVE-2024-9398","CVE-2024-9399","CVE-2024-9400","CVE-2024-9401","CVE-2024-9402"]}