Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-31740 (GCVE-0-2022-31740)
Vulnerability from cvelistv5 – Published: 2022-12-22 00:00 – Updated: 2025-04-16 13:51- Register allocation problem in WASM on arm64
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 91.10
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 101
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 91.10
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T07:26:01.078Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-31740",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T13:51:22.370528Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T13:51:26.258Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "101",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.10",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Register allocation problem in WASM on arm64",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-22T00:00:00.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2022-31740",
"datePublished": "2022-12-22T00:00:00.000Z",
"dateReserved": "2022-05-26T00:00:00.000Z",
"dateUpdated": "2025-04-16T13:51:26.258Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-31740",
"date": "2026-05-20",
"epss": "0.00244",
"percentile": "0.47669"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"101.0\", \"matchCriteriaId\": \"52843F5C-D729-47F6-AAAF-7BAFCE67D91F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.10\", \"matchCriteriaId\": \"4A30F8BF-AE74-4F4D-A80A-F924AA128DE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.10\", \"matchCriteriaId\": \"4A62DB30-D938-4ADD-BF43-9BBC56A6B8C0\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\"}, {\"lang\": \"es\", \"value\": \"En arm64, el c\\u00f3digo WASM podr\\u00eda haber dado lugar a una generaci\\u00f3n de ensamblaje incorrecta, lo que provoc\\u00f3 un problema de asignaci\\u00f3n de registros y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.10, Firefox \u0026lt; 101 y Firefox ESR \u0026lt; 91.10.\"}]",
"id": "CVE-2022-31740",
"lastModified": "2024-11-21T07:05:12.547",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 5.9}]}",
"published": "2022-12-22T20:15:28.790",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-20/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-21/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-22/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-20/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-21/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-22/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-31740\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2022-12-22T20:15:28.790\",\"lastModified\":\"2025-04-16T14:15:22.063\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\"},{\"lang\":\"es\",\"value\":\"En arm64, el c\u00f3digo WASM podr\u00eda haber dado lugar a una generaci\u00f3n de ensamblaje incorrecta, lo que provoc\u00f3 un problema de asignaci\u00f3n de registros y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.10, Firefox \u0026lt; 101 y Firefox ESR \u0026lt; 91.10.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"101.0\",\"matchCriteriaId\":\"52843F5C-D729-47F6-AAAF-7BAFCE67D91F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.10\",\"matchCriteriaId\":\"4A30F8BF-AE74-4F4D-A80A-F924AA128DE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.10\",\"matchCriteriaId\":\"4A62DB30-D938-4ADD-BF43-9BBC56A6B8C0\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-20/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-21/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-22/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-20/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-21/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-22/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-20/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-22/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-21/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T07:26:01.078Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-31740\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T13:51:22.370528Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T13:51:07.430Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Thunderbird\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"91.10\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"101\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox ESR\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"91.10\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-20/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-22/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-21/\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1766806\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Register allocation problem in WASM on arm64\"}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2022-12-22T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-31740\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-16T13:51:26.258Z\", \"dateReserved\": \"2022-05-26T00:00:00.000Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2022-12-22T00:00:00.000Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-511
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 101",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.10",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 101",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-31738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31738"
},
{
"name": "CVE-2022-31741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31741"
},
{
"name": "CVE-2022-31747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31747"
},
{
"name": "CVE-2022-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1919"
},
{
"name": "CVE-2022-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1887"
},
{
"name": "CVE-2022-31748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31748"
},
{
"name": "CVE-2022-31740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31740"
},
{
"name": "CVE-2022-31744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31744"
},
{
"name": "CVE-2022-31737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31737"
},
{
"name": "CVE-2022-31736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31736"
},
{
"name": "CVE-2022-31745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31745"
},
{
"name": "CVE-2022-31739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31739"
},
{
"name": "CVE-2022-31743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31743"
},
{
"name": "CVE-2022-31742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31742"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-511",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-23 du 01 juin 2022.",
"revision_date": "2022-06-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-21 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-20 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-23 du 01 juin 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-23//"
}
]
}
CERTFR-2022-AVI-512
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.10",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-31738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31738"
},
{
"name": "CVE-2022-31741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31741"
},
{
"name": "CVE-2022-31747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31747"
},
{
"name": "CVE-2022-31740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31740"
},
{
"name": "CVE-2022-31737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31737"
},
{
"name": "CVE-2022-31736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31736"
},
{
"name": "CVE-2022-31739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31739"
},
{
"name": "CVE-2022-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1834"
},
{
"name": "CVE-2022-31742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31742"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-512",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-22 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22/"
}
]
}
CERTFR-2022-AVI-511
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox pour iOS versions ant\u00e9rieures \u00e0 101",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.10",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 101",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-31738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31738"
},
{
"name": "CVE-2022-31741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31741"
},
{
"name": "CVE-2022-31747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31747"
},
{
"name": "CVE-2022-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1919"
},
{
"name": "CVE-2022-1887",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1887"
},
{
"name": "CVE-2022-31748",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31748"
},
{
"name": "CVE-2022-31740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31740"
},
{
"name": "CVE-2022-31744",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31744"
},
{
"name": "CVE-2022-31737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31737"
},
{
"name": "CVE-2022-31736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31736"
},
{
"name": "CVE-2022-31745",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31745"
},
{
"name": "CVE-2022-31739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31739"
},
{
"name": "CVE-2022-31743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31743"
},
{
"name": "CVE-2022-31742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31742"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-511",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-01T00:00:00.000000"
},
{
"description": "Ajout du bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-23 du 01 juin 2022.",
"revision_date": "2022-06-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nElles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code\narbitraire \u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et\nune atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-21 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-21/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-20 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-20/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-23 du 01 juin 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-23//"
}
]
}
CERTFR-2022-AVI-512
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.10 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.10",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-31738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31738"
},
{
"name": "CVE-2022-31741",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31741"
},
{
"name": "CVE-2022-31747",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31747"
},
{
"name": "CVE-2022-31740",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31740"
},
{
"name": "CVE-2022-31737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31737"
},
{
"name": "CVE-2022-31736",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31736"
},
{
"name": "CVE-2022-31739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31739"
},
{
"name": "CVE-2022-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1834"
},
{
"name": "CVE-2022-31742",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31742"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-512",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-06-01T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-22 du 31 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-22/"
}
]
}
CNVD-2023-06865
Vulnerability from cnvd - Published: 2023-02-03目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://www.mozilla.org/en-US/security/advisories/mfsa2022-20/
| Name | ['Mozilla Thunderbird <91.10', 'Mozilla Firefox ESR <91.10', 'Mozilla Firefox <101.0'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2022-31740"
}
},
"description": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\n\nMozilla Firefox\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0earm64\u7684WASM\u4e2d\u7684\u5bc4\u5b58\u5668\u5206\u914d\u95ee\u9898\u76f8\u5173\u7684\u8fb9\u754c\u9519\u8bef\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2022-20/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2023-06865",
"openTime": "2023-02-03",
"patchDescription": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Firefox\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u4e0earm64\u7684WASM\u4e2d\u7684\u5bc4\u5b58\u5668\u5206\u914d\u95ee\u9898\u76f8\u5173\u7684\u8fb9\u754c\u9519\u8bef\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u5229\u7528\u8be5\u6f0f\u6d1e\u53ef\u5728\u76ee\u6807\u7cfb\u7edf\u4e0a\u6267\u884c\u4efb\u610f\u4ee3\u7801\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2023-06865\uff09\u7684\u8865\u4e01",
"products": {
"product": [
"Mozilla Thunderbird \u003c91.10",
"Mozilla Firefox ESR \u003c91.10",
"Mozilla Firefox \u003c101.0"
]
},
"referenceLink": "https://www.auscert.org.au/bulletins/ESB-2022.2686",
"serverity": "\u9ad8",
"submitTime": "2022-06-01",
"title": "Mozilla Firefox\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff08CNVD-2023-06865\uff09"
}
FKIE_CVE-2022-31740
Vulnerability from fkie_nvd - Published: 2022-12-22 20:15 - Updated: 2025-04-16 14:158.8 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1766806 | Issue Tracking, Permissions Required, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-20/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-21/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-22/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1766806 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-20/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-21/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-22/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "52843F5C-D729-47F6-AAAF-7BAFCE67D91F",
"versionEndExcluding": "101.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A30F8BF-AE74-4F4D-A80A-F924AA128DE5",
"versionEndExcluding": "91.10",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4A62DB30-D938-4ADD-BF43-9BBC56A6B8C0",
"versionEndExcluding": "91.10",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10."
},
{
"lang": "es",
"value": "En arm64, el c\u00f3digo WASM podr\u00eda haber dado lugar a una generaci\u00f3n de ensamblaje incorrecta, lo que provoc\u00f3 un problema de asignaci\u00f3n de registros y un bloqueo potencialmente explotable. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.10, Firefox \u0026lt; 101 y Firefox ESR \u0026lt; 91.10."
}
],
"id": "CVE-2022-31740",
"lastModified": "2025-04-16T14:15:22.063",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-12-22T20:15:28.790",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-GM8J-QHFM-MGV8
Vulnerability from github – Published: 2022-12-22 21:30 – Updated: 2025-04-16 15:34On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird < 91.10, Firefox < 101, and Firefox ESR < 91.10.
{
"affected": [],
"aliases": [
"CVE-2022-31740"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T20:15:00Z",
"severity": "CRITICAL"
},
"details": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"id": "GHSA-gm8j-qhfm-mgv8",
"modified": "2025-04-16T15:34:09Z",
"published": "2022-12-22T21:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-31740"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2022-31740
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-31740",
"description": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"id": "GSD-2022-31740"
},
"gsd": {
"affected": [
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox"
},
"ranges": [
{
"events": [
{
"fixed": "101"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox ESR"
},
"ranges": [
{
"events": [
{
"fixed": "91.10"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Thunderbird"
},
"ranges": [
{
"events": [
{
"fixed": "91.10"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
}
],
"alias": [
"CVE-2022-31740"
],
"database_specific": {
"GSD": {
"alias": "CVE-2022-31740",
"id": "GSD-2022-31740",
"references": [
"https://www.debian.org/security/2022/dsa-5156",
"https://www.debian.org/security/2022/dsa-5158",
"https://advisories.mageia.org/CVE-2022-31740.html",
"https://linux.oracle.com/cve/CVE-2022-31740.html",
"https://access.redhat.com/errata/RHSA-2022:4870",
"https://access.redhat.com/errata/RHSA-2022:4871",
"https://access.redhat.com/errata/RHSA-2022:4872",
"https://access.redhat.com/errata/RHSA-2022:4873",
"https://access.redhat.com/errata/RHSA-2022:4875",
"https://access.redhat.com/errata/RHSA-2022:4876",
"https://access.redhat.com/errata/RHSA-2022:4887",
"https://access.redhat.com/errata/RHSA-2022:4888",
"https://access.redhat.com/errata/RHSA-2022:4889",
"https://access.redhat.com/errata/RHSA-2022:4890",
"https://access.redhat.com/errata/RHSA-2022:4891",
"https://access.redhat.com/errata/RHSA-2022:4892",
"https://www.suse.com/security/cve/CVE-2022-31740.html",
"https://ubuntu.com/security/CVE-2022-31740"
]
}
},
"details": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Firefox \u003c 101, Firefox ESR \u003c 91.10, and Thunderbird \u003c 91.10.",
"id": "GSD-2022-31740",
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"modified": "2022-09-27T16:35:16.444915Z",
"osvSchema": {
"aliases": [
"CVE-2022-31740"
],
"details": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"id": "GSD-2022-31740",
"modified": "2023-12-13T01:19:17.838173Z",
"schema_version": "1.4.0"
},
"references": [
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"type": "ADVISORY",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5156"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5158"
},
{
"type": "ADVISORY",
"url": "https://advisories.mageia.org/CVE-2022-31740.html"
},
{
"type": "ADVISORY",
"url": "https://linux.oracle.com/cve/CVE-2022-31740.html"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4870"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4871"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4872"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4873"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4875"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4876"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4887"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4888"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4889"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4890"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4891"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4892"
},
{
"type": "ADVISORY",
"url": "https://www.suse.com/security/cve/CVE-2022-31740.html"
},
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/CVE-2022-31740"
}
],
"schema_version": "1.3.0",
"summary": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Firefox \u003c 101, Firefox ESR \u003c 91.10, and Thunderbird \u003c 91.10."
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-31740",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.10"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "101"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.10"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Register allocation problem in WASM on arm64"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-20/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-22/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-21/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-31740"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "101"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.10"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.10"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Firefox \u003c 101, Firefox ESR \u003c 91.10, and Thunderbird \u003c 91.10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Register allocation problem in WASM on arm64"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.10",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "101.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-31740"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-20/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-20/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-22/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-22/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-21/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-21/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1766806"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2023-01-06T14:00Z",
"publishedDate": "2022-12-22T20:15Z"
}
}
}
OPENSUSE-SU-2024:12117-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaThunderbird-91.10.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaThunderbird-91.10.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12117",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12117-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1834 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1834/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31736 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31737 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31738 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31739 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31747/"
}
],
"title": "MozillaThunderbird-91.10.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12117-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-91.10.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-91.10.0-1.1.aarch64",
"product_id": "MozillaThunderbird-91.10.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"product_id": "MozillaThunderbird-translations-common-91.10.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"product_id": "MozillaThunderbird-translations-other-91.10.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-91.10.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-91.10.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-91.10.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-91.10.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-91.10.0-1.1.s390x",
"product_id": "MozillaThunderbird-91.10.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"product_id": "MozillaThunderbird-translations-common-91.10.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"product_id": "MozillaThunderbird-translations-other-91.10.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-91.10.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-91.10.0-1.1.x86_64",
"product_id": "MozillaThunderbird-91.10.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-91.10.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-91.10.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-91.10.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-91.10.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-91.10.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-91.10.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-91.10.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-91.10.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-91.10.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-91.10.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-91.10.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-91.10.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1834",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1834"
}
],
"notes": [
{
"category": "general",
"text": "When displaying the sender of an email, and the sender name contained the Braille Pattern Blank space character multiple times, Thunderbird would have displayed all the spaces. This could have been used by an attacker to send an email message with the attacker\u0027s digital signature, that was shown with an arbitrary sender email address chosen by the attacker. If the sender name started with a false email address, followed by many Braille space characters, the attacker\u0027s email address was not visible. Because Thunderbird compared the invisible sender address with the signature\u0027s email address, if the signing key or certificate was accepted by Thunderbird, the email was shown as having a valid digital signature. This vulnerability affects Thunderbird \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1834",
"url": "https://www.suse.com/security/cve/CVE-2022-1834"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1834"
},
{
"cve": "CVE-2022-31736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31736"
}
],
"notes": [
{
"category": "general",
"text": "A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31736",
"url": "https://www.suse.com/security/cve/CVE-2022-31736"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31736",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31736"
},
{
"cve": "CVE-2022-31737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31737"
}
],
"notes": [
{
"category": "general",
"text": "A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31737",
"url": "https://www.suse.com/security/cve/CVE-2022-31737"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31737",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31737"
},
{
"cve": "CVE-2022-31738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31738"
}
],
"notes": [
{
"category": "general",
"text": "When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31738",
"url": "https://www.suse.com/security/cve/CVE-2022-31738"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31738",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31738"
},
{
"cve": "CVE-2022-31739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31739"
}
],
"notes": [
{
"category": "general",
"text": "When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.\u003cbr\u003e*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31739",
"url": "https://www.suse.com/security/cve/CVE-2022-31739"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31739",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31739"
},
{
"cve": "CVE-2022-31740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31740"
}
],
"notes": [
{
"category": "general",
"text": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31740",
"url": "https://www.suse.com/security/cve/CVE-2022-31740"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31740",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31740"
},
{
"cve": "CVE-2022-31741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31741"
}
],
"notes": [
{
"category": "general",
"text": "A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31741",
"url": "https://www.suse.com/security/cve/CVE-2022-31741"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31741",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31741"
},
{
"cve": "CVE-2022-31742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31742"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31742",
"url": "https://www.suse.com/security/cve/CVE-2022-31742"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31742",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31742"
},
{
"cve": "CVE-2022-31747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31747"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31747",
"url": "https://www.suse.com/security/cve/CVE-2022-31747"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31747",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-91.10.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-91.10.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31747"
}
]
}
OPENSUSE-SU-2024:12121-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaFirefox-101.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaFirefox-101.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12121",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12121-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-1919 page",
"url": "https://www.suse.com/security/cve/CVE-2022-1919/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31736 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31737 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31737/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31738 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31739 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31740 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31741 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31741/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31742 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31743 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31744 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31745 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31747 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-31748 page",
"url": "https://www.suse.com/security/cve/CVE-2022-31748/"
}
],
"title": "MozillaFirefox-101.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12121-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-101.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-101.0-1.1.aarch64",
"product_id": "MozillaFirefox-101.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"product_id": "MozillaFirefox-branding-upstream-101.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-101.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-devel-101.0-1.1.aarch64",
"product_id": "MozillaFirefox-devel-101.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-101.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-common-101.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-common-101.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-101.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-other-101.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-other-101.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-101.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-101.0-1.1.ppc64le",
"product_id": "MozillaFirefox-101.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"product_id": "MozillaFirefox-branding-upstream-101.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-101.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-devel-101.0-1.1.ppc64le",
"product_id": "MozillaFirefox-devel-101.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-common-101.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-other-101.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-101.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-101.0-1.1.s390x",
"product_id": "MozillaFirefox-101.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"product_id": "MozillaFirefox-branding-upstream-101.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-101.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-devel-101.0-1.1.s390x",
"product_id": "MozillaFirefox-devel-101.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-101.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-common-101.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-common-101.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-101.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-other-101.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-other-101.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-101.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-101.0-1.1.x86_64",
"product_id": "MozillaFirefox-101.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-101.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-101.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-101.0-1.1.x86_64",
"product_id": "MozillaFirefox-devel-101.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-101.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-101.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-common-101.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-101.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-101.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-other-101.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-101.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-101.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-101.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-101.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-101.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-101.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-101.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-101.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-101.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-101.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-devel-101.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-101.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-devel-101.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-101.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-devel-101.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-101.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-101.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-101.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-common-101.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-101.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-101.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-common-101.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-101.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-101.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-101.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-other-101.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-101.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-101.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-other-101.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-101.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-101.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-1919",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-1919"
}
],
"notes": [
{
"category": "general",
"text": "Use after free in Codecs in Google Chrome prior to 101.0.4951.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-1919",
"url": "https://www.suse.com/security/cve/CVE-2022-1919"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-1919",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-1919"
},
{
"cve": "CVE-2022-31736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31736"
}
],
"notes": [
{
"category": "general",
"text": "A malicious website could have learned the size of a cross-origin resource that supported Range requests. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31736",
"url": "https://www.suse.com/security/cve/CVE-2022-31736"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31736",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31736"
},
{
"cve": "CVE-2022-31737",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31737"
}
],
"notes": [
{
"category": "general",
"text": "A malicious webpage could have caused an out-of-bounds write in WebGL, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31737",
"url": "https://www.suse.com/security/cve/CVE-2022-31737"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31737",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31737"
},
{
"cve": "CVE-2022-31738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31738"
}
],
"notes": [
{
"category": "general",
"text": "When exiting fullscreen mode, an iframe could have confused the browser about the current state of fullscreen, resulting in potential user confusion or spoofing attacks. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31738",
"url": "https://www.suse.com/security/cve/CVE-2022-31738"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31738",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31738"
},
{
"cve": "CVE-2022-31739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31739"
}
],
"notes": [
{
"category": "general",
"text": "When downloading files on Windows, the % character was not escaped, which could have lead to a download incorrectly being saved to attacker-influenced paths that used variables such as %HOMEPATH% or %APPDATA%.\u003cbr\u003e*This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31739",
"url": "https://www.suse.com/security/cve/CVE-2022-31739"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31739",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31739"
},
{
"cve": "CVE-2022-31740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31740"
}
],
"notes": [
{
"category": "general",
"text": "On arm64, WASM code could have resulted in incorrect assembly generation leading to a register allocation problem, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31740",
"url": "https://www.suse.com/security/cve/CVE-2022-31740"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31740",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31740"
},
{
"cve": "CVE-2022-31741",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31741"
}
],
"notes": [
{
"category": "general",
"text": "A crafted CMS message could have been processed incorrectly, leading to an invalid memory read, and potentially further memory corruption. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31741",
"url": "https://www.suse.com/security/cve/CVE-2022-31741"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31741",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31741"
},
{
"cve": "CVE-2022-31742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31742"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have exploited a timing attack by sending a large number of allowCredential entries and detecting the difference between invalid key handles and cross-origin key handles. This could have led to cross-origin account linking in violation of WebAuthn goals. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31742",
"url": "https://www.suse.com/security/cve/CVE-2022-31742"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31742",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31742"
},
{
"cve": "CVE-2022-31743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31743"
}
],
"notes": [
{
"category": "general",
"text": "Firefox\u0027s HTML parser did not correctly interpret HTML comment tags, resulting in an incongruity with other browsers. This could have been used to escape HTML comments on pages that put user-controlled data in them. This vulnerability affects Firefox \u003c 101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31743",
"url": "https://www.suse.com/security/cve/CVE-2022-31743"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31743",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31743"
},
{
"cve": "CVE-2022-31744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31744"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have injected CSS into stylesheets accessible via internal URIs, such as resource:, and in doing so bypass a page\u0027s Content Security Policy. This vulnerability affects Firefox ESR \u003c 91.11, Thunderbird \u003c 102, Thunderbird \u003c 91.11, and Firefox \u003c 101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31744",
"url": "https://www.suse.com/security/cve/CVE-2022-31744"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31744",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31744"
},
{
"cve": "CVE-2022-31745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31745"
}
],
"notes": [
{
"category": "general",
"text": "If array shift operations are not used, the Garbage Collector may have become confused about valid objects. This vulnerability affects Firefox \u003c 101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31745",
"url": "https://www.suse.com/security/cve/CVE-2022-31745"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31745",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31745"
},
{
"cve": "CVE-2022-31747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31747"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers Andrew McCreight, Nicolas B. Pierron, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100 and Firefox ESR 91.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.10, Firefox \u003c 101, and Firefox ESR \u003c 91.10.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31747",
"url": "https://www.suse.com/security/cve/CVE-2022-31747"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31747",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31747"
},
{
"cve": "CVE-2022-31748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-31748"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers Gabriele Svelto, Timothy Nikkel, Randell Jesup, Jon Coppeard, and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 100. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 101.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-31748",
"url": "https://www.suse.com/security/cve/CVE-2022-31748"
},
{
"category": "external",
"summary": "SUSE Bug 1200027 for CVE-2022-31748",
"url": "https://bugzilla.suse.com/1200027"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-101.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-101.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-31748"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.