Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-36314 (GCVE-0-2022-36314)
Vulnerability from cvelistv5 – Published: 2022-12-22 00:00 – Updated: 2025-04-15 17:33- Opening local <code>.lnk</code> files could cause unexpected network loads
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 102.1
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 103
(custom)
|
|
| Mozilla | Thunderbird |
Affected:
unspecified , < 102.1
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:00:04.371Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-36314",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-15T17:33:47.995440Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427 Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T17:33:52.675Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"exploit"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "102.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "103",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "102.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Opening local \u003ccode\u003e.lnk\u003c/code\u003e files could cause unexpected network loads",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-22T00:00:00.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2022-36314",
"datePublished": "2022-12-22T00:00:00.000Z",
"dateReserved": "2022-07-20T00:00:00.000Z",
"dateUpdated": "2025-04-15T17:33:52.675Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-36314",
"date": "2026-05-24",
"epss": "0.00047",
"percentile": "0.14854"
},
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"103.0\", \"matchCriteriaId\": \"462DFC94-393F-4760-9D12-17B8ABBACE5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"102.1\", \"matchCriteriaId\": \"3D1E0075-4AF4-40A8-A08F-E5DF3243810E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"102.1\", \"matchCriteriaId\": \"8EAC693F-DD6D-4496-A67F-98FE041F03F5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\"}, {\"lang\": \"es\", \"value\": \"Al abrir un acceso directo de Windows desde el sistema de archivos local, un atacante podr\\u00eda proporcionar una ruta remota que generar\\u00eda solicitudes de red inesperadas desde el Sistema Operativo.\u003cbr\u003eEste error solo afecta a Firefox para Windows. Otros sistemas operativos no se ven afectados.*. Esta vulnerabilidad afecta a Firefox ESR \u0026lt; 102.1, Firefox \u0026lt; 103 y Thunderbird \u0026lt; 102.1.\"}]",
"id": "CVE-2022-36314",
"lastModified": "2024-11-21T07:12:45.903",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 5.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 3.6}]}",
"published": "2022-12-22T20:15:34.807",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-28/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-30/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-32/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-28/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-30/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-32/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-427\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-36314\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2022-12-22T20:15:34.807\",\"lastModified\":\"2025-04-15T18:15:43.207\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\"},{\"lang\":\"es\",\"value\":\"Al abrir un acceso directo de Windows desde el sistema de archivos local, un atacante podr\u00eda proporcionar una ruta remota que generar\u00eda solicitudes de red inesperadas desde el Sistema Operativo.\u003cbr\u003eEste error solo afecta a Firefox para Windows. Otros sistemas operativos no se ven afectados.*. Esta vulnerabilidad afecta a Firefox ESR \u0026lt; 102.1, Firefox \u0026lt; 103 y Thunderbird \u0026lt; 102.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-427\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"103.0\",\"matchCriteriaId\":\"462DFC94-393F-4760-9D12-17B8ABBACE5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"102.1\",\"matchCriteriaId\":\"3D1E0075-4AF4-40A8-A08F-E5DF3243810E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"102.1\",\"matchCriteriaId\":\"8EAC693F-DD6D-4496-A67F-98FE041F03F5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-28/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-30/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-32/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-28/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-30/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-32/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-28/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-30/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-32/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T10:00:04.371Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-36314\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-15T17:33:47.995440Z\"}}}], \"references\": [{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\", \"tags\": [\"exploit\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-427\", \"description\": \"CWE-427 Uncontrolled Search Path Element\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-15T17:33:06.768Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Firefox ESR\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"102.1\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"103\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Thunderbird\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"102.1\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-28/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-30/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-32/\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1773894\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Opening local \u003ccode\u003e.lnk\u003c/code\u003e files could cause unexpected network loads\"}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2022-12-22T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-36314\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-15T17:33:52.675Z\", \"dateReserved\": \"2022-07-20T00:00:00.000Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2022-12-22T00:00:00.000Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-684
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 102.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.12",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 103",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-36318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36318"
},
{
"name": "CVE-2022-36314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36314"
},
{
"name": "CVE-2022-36316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36316"
},
{
"name": "CVE-2022-36320",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36320"
},
{
"name": "CVE-2022-36319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36319"
},
{
"name": "CVE-2022-36315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36315"
},
{
"name": "CVE-2022-36317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36317"
},
{
"name": "CVE-2022-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2505"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-684",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-28 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-30 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-29 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29/"
}
]
}
CERTFR-2022-AVI-694
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.12 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 102.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.12",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 102.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-36318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36318"
},
{
"name": "CVE-2022-36314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36314"
},
{
"name": "CVE-2022-36319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36319"
},
{
"name": "CVE-2022-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2505"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-694",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-31 du 28 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-32 du 28 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32/"
}
]
}
CERTFR-2022-AVI-684
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 102.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.12",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 103",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-36318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36318"
},
{
"name": "CVE-2022-36314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36314"
},
{
"name": "CVE-2022-36316",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36316"
},
{
"name": "CVE-2022-36320",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36320"
},
{
"name": "CVE-2022-36319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36319"
},
{
"name": "CVE-2022-36315",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36315"
},
{
"name": "CVE-2022-36317",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36317"
},
{
"name": "CVE-2022-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2505"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-684",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-27T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-28 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-28/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-30 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-29 du 26 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-29/"
}
]
}
CERTFR-2022-AVI-694
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.12 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 102.1 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.12",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 102.1",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-36318",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36318"
},
{
"name": "CVE-2022-36314",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36314"
},
{
"name": "CVE-2022-36319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36319"
},
{
"name": "CVE-2022-2505",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2505"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-694",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-07-29T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution\nde code arbitraire \u00e0 distance et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-31 du 28 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-31/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-32 du 28 juillet 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-32/"
}
]
}
BDU:2022-05989
Vulnerability from fstec - Published: 26.07.2022{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Novell Inc., \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb, Mozilla Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "12 SP4 (SUSE Linux Enterprise Server for SAP Applications), 12 SP2-BCL (Suse Linux Enterprise Server), 15 (SUSE Linux Enterprise Server for SAP Applications), 15 SP1 (SUSE Linux Enterprise Server for SAP Applications), 12 SP3-LTSS (Suse Linux Enterprise Server), 12 SP3-BCL (Suse Linux Enterprise Server), 12 SP5 (Suse Linux Enterprise Server), 12 SP5 (SUSE Linux Enterprise Server for SAP Applications), 12 SP5 (SUSE Linux Enterprise Software Development Kit), 6 (SUSE Enterprise Storage), 12 SP3-ESPOS (Suse Linux Enterprise Server), 9 (SUSE OpenStack Cloud), 15-LTSS (Suse Linux Enterprise Server), - (openSUSE Tumbleweed), Crowbar 9 (SUSE OpenStack Cloud), 12 SP4-ESPOS (Suse Linux Enterprise Server), 4.0 (SUSE CaaS Platform), 12 SP4-LTSS (Suse Linux Enterprise Server), 15 SP1-BCL (Suse Linux Enterprise Server), 15 SP1-LTSS (Suse Linux Enterprise Server), 15 SP1-LTSS (SUSE Linux Enterprise High Performance Computing), 15 SP1-ESPOS (SUSE Linux Enterprise High Performance Computing), 15 SP3 (SUSE Linux Enterprise Module for Desktop Applications), 15.3 (OpenSUSE Leap), 15.4 (OpenSUSE Leap), 15 SP3 (SUSE Linux Enterprise High Performance Computing), 15 SP3 (Suse Linux Enterprise Server), 15 SP3 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Proxy), 4.2 (SUSE Manager Server), 15 SP3 (Suse Linux Enterprise Desktop), 15 SP2 (SUSE Linux Enterprise Server for SAP Applications), 4.1 (SUSE Manager Server), 4.1 (SUSE Manager Proxy), 15 SP2-ESPOS (SUSE Linux Enterprise High Performance Computing), 15 SP2-LTSS (SUSE Linux Enterprise High Performance Computing), 4.1 (SUSE Manager Retail Branch Server), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), 15 SP4 (Suse Linux Enterprise Server), 15 SP4 (Suse Linux Enterprise Desktop), 15 SP2-BCL (Suse Linux Enterprise Server), 15 SP4 (SUSE Linux Enterprise Server for SAP Applications), 4.2 (SUSE Manager Retail Branch Server), 15 SP2-LTSS (Suse Linux Enterprise Server), 4.3 (SUSE Manager Retail Branch Server), 4.3 (SUSE Manager Proxy), 4.3 (SUSE Manager Server), 7.1 (SUSE Enterprise Storage), 15 SP4 (SUSE Linux Enterprise Module for Desktop Applications), \u0434\u043e 103 (Firefox), \u0434\u043e 103 (Firefox ESR), \u0434\u043e 103 (Thunderbird), 15 SP3 (SUSE Linux Enterprise Module for additional PackageHub), 15 SP4 (SUSE Linux Enterprise Module for additional PackageHub), 15 SP4 (SUSE Linux Enterprise Workstation Extension)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0423\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0439 \u0438\u0437 \u0434\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0445 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u043e\u0432.\n\u0412 \u0441\u0432\u044f\u0437\u0438 \u0441\u043e \u0441\u043b\u043e\u0436\u0438\u0432\u0448\u0435\u0439\u0441\u044f \u043e\u0431\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u043e\u0439 \u0438 \u0432\u0432\u0435\u0434\u0435\u043d\u043d\u044b\u043c\u0438 \u0441\u0430\u043d\u043a\u0446\u0438\u044f\u043c\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0420\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u043e\u0439 \u0424\u0435\u0434\u0435\u0440\u0430\u0446\u0438\u0438 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0443\u0435\u0442\u0441\u044f \u0443\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u043e\u043b\u044c\u043a\u043e \u043f\u043e\u0441\u043b\u0435 \u043e\u0446\u0435\u043d\u043a\u0438 \u0432\u0441\u0435\u0445 \u0441\u043e\u043f\u0443\u0442\u0441\u0442\u0432\u0443\u044e\u0449\u0438\u0445 \u0440\u0438\u0441\u043a\u043e\u0432.\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u043e\u0439 \u0437\u0430\u0449\u0438\u0442\u044b \u0441 \u0444\u0443\u043d\u043a\u0446\u0438\u0435\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043a \u0432\u0435\u0431-\u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u0432 \u0441\u0435\u0442\u044c \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u2013 \u0440\u0435\u0433\u043b\u0430\u043c\u0435\u043d\u0442\u0430\u0446\u0438\u044f \u0440\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u043d\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 \u0438 \u0441\u043e\u0435\u0434\u0438\u043d\u0435\u043d\u0438\u0439;\n- \u0437\u0430\u043f\u0443\u0441\u043a \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435;\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043b\u044c\u0442\u0435\u0440\u043d\u0430\u0442\u0438\u0432\u043d\u044b\u0445 \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432;\n- \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Mozilla Firefox:\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2022-30/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2022-28/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttps://www.suse.com/zh-cn/security/cve/CVE-2022-36314.html\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "26.07.2022",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "17.03.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "28.09.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-05989",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2022-36314",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SUSE Linux Enterprise Server for SAP Applications, Suse Linux Enterprise Server, SUSE Linux Enterprise Software Development Kit, SUSE Enterprise Storage, SUSE OpenStack Cloud, openSUSE Tumbleweed, SUSE CaaS Platform, SUSE Linux Enterprise High Performance Computing, SUSE Linux Enterprise Module for Desktop Applications, OpenSUSE Leap, SUSE Manager Proxy, SUSE Manager Server, Suse Linux Enterprise Desktop, SUSE Manager Retail Branch Server, \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Firefox, Firefox ESR, Thunderbird, SUSE Linux Enterprise Module for additional PackageHub, SUSE Linux Enterprise Workstation Extension",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP4 , Novell Inc. Suse Linux Enterprise Server 12 SP2-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP1 , Novell Inc. Suse Linux Enterprise Server 12 SP3-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP3-BCL , Novell Inc. Suse Linux Enterprise Server 12 SP5 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 12 SP5 , Novell Inc. Suse Linux Enterprise Server 12 SP3-ESPOS , Novell Inc. Suse Linux Enterprise Server 15-LTSS , Novell Inc. Suse Linux Enterprise Server 12 SP4-ESPOS , Novell Inc. Suse Linux Enterprise Server 12 SP4-LTSS , Novell Inc. Suse Linux Enterprise Server 15 SP1-BCL , Novell Inc. Suse Linux Enterprise Server 15 SP1-LTSS , Novell Inc. OpenSUSE Leap 15.3 , Novell Inc. OpenSUSE Leap 15.4 , Novell Inc. Suse Linux Enterprise Server 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP3 , Novell Inc. Suse Linux Enterprise Desktop 15 SP3 , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP2 , \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), Novell Inc. Suse Linux Enterprise Server 15 SP4 , Novell Inc. Suse Linux Enterprise Desktop 15 SP4 , Novell Inc. Suse Linux Enterprise Server 15 SP2-BCL , Novell Inc. SUSE Linux Enterprise Server for SAP Applications 15 SP4 , Novell Inc. Suse Linux Enterprise Server 15 SP2-LTSS ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u043e\u0448\u0438\u0431\u043e\u0447\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 \u0434\u043b\u044f \u043e\u0448\u0438\u0431\u043e\u0447\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 (CWE-668)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0440\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435\u043c \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u0432 \u043e\u0448\u0438\u0431\u043e\u0447\u043d\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0437\u0430\u043f\u0440\u043e\u0441\u044b \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-30/\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2022-28/\nhttps://www.suse.com/zh-cn/security/cve/CVE-2022-36314.htm\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-668",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,4)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)"
}
FKIE_CVE-2022-36314
Vulnerability from fkie_nvd - Published: 2022-12-22 20:15 - Updated: 2025-04-15 18:155.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * | |
| microsoft | windows | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "462DFC94-393F-4760-9D12-17B8ABBACE5D",
"versionEndExcluding": "103.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "3D1E0075-4AF4-40A8-A08F-E5DF3243810E",
"versionEndExcluding": "102.1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8EAC693F-DD6D-4496-A67F-98FE041F03F5",
"versionEndExcluding": "102.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1."
},
{
"lang": "es",
"value": "Al abrir un acceso directo de Windows desde el sistema de archivos local, un atacante podr\u00eda proporcionar una ruta remota que generar\u00eda solicitudes de red inesperadas desde el Sistema Operativo.\u003cbr\u003eEste error solo afecta a Firefox para Windows. Otros sistemas operativos no se ven afectados.*. Esta vulnerabilidad afecta a Firefox ESR \u0026lt; 102.1, Firefox \u0026lt; 103 y Thunderbird \u0026lt; 102.1."
}
],
"id": "CVE-2022-36314",
"lastModified": "2025-04-15T18:15:43.207",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-12-22T20:15:34.807",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-M6JF-WJ3W-42J2
Vulnerability from github – Published: 2022-12-22 21:30 – Updated: 2025-04-15 18:31When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.
This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR < 102.1, Firefox < 103, and Thunderbird < 102.1.
{
"affected": [],
"aliases": [
"CVE-2022-36314"
],
"database_specific": {
"cwe_ids": [
"CWE-427"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T20:15:00Z",
"severity": "MODERATE"
},
"details": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"id": "GHSA-m6jf-wj3w-42j2",
"modified": "2025-04-15T18:31:31Z",
"published": "2022-12-22T21:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-36314"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2022-36314
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-36314",
"description": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"id": "GSD-2022-36314"
},
"gsd": {
"affected": [
{
"package": {
"ecosystem": "Mozilla",
"name": "Thunderbird"
},
"ranges": [
{
"events": [
{
"fixed": "102.1"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox ESR"
},
"ranges": [
{
"events": [
{
"fixed": "102.1"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox"
},
"ranges": [
{
"events": [
{
"fixed": "103"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
}
],
"alias": [
"CVE-2022-36314"
],
"database_specific": {
"GSD": {
"alias": "CVE-2022-36314",
"id": "GSD-2022-36314",
"references": [
"https://www.suse.com/security/cve/CVE-2022-36314.html"
]
}
},
"details": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 102.1, Firefox ESR \u003c 102.1, and Firefox \u003c 103.",
"id": "GSD-2022-36314",
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"modified": "2022-09-27T16:35:15.747628Z",
"osvSchema": {
"aliases": [
"CVE-2022-36314"
],
"details": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"id": "GSD-2022-36314",
"modified": "2023-12-13T01:19:21.170258Z",
"schema_version": "1.4.0"
},
"references": [
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"type": "ADVISORY",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
},
{
"type": "ADVISORY",
"url": "https://www.suse.com/security/cve/CVE-2022-36314.html"
}
],
"schema_version": "1.3.0",
"summary": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 102.1, Firefox ESR \u003c 102.1, and Firefox \u003c 103."
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-36314",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.1"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "103"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Opening local \u003ccode\u003e.lnk\u003c/code\u003e files could cause unexpected network loads"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-28/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-30/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-32/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-36314"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.1"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.1"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "103"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 102.1, Firefox ESR \u003c 102.1, and Firefox \u003c 103."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Opening local \u003ccode\u003e.lnk\u003c/code\u003e files could cause unexpected network loads"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "103.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "102.1",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "102.1",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-36314"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-427"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-30/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-30/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-32/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-32/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-28/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-28/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1773894"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-01-03T20:15Z",
"publishedDate": "2022-12-22T20:15Z"
}
}
}
OPENSUSE-SU-2024:12227-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaFirefox-103.0.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaFirefox-103.0.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12227",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12227-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2505 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36314 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36315 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36315/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36316 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36317 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36317/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36319 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36319/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36320 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36320/"
}
],
"title": "MozillaFirefox-103.0.1-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12227-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-103.0.1-1.1.aarch64",
"product": {
"name": "MozillaFirefox-103.0.1-1.1.aarch64",
"product_id": "MozillaFirefox-103.0.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"product": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"product_id": "MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-103.0.1-1.1.aarch64",
"product": {
"name": "MozillaFirefox-devel-103.0.1-1.1.aarch64",
"product_id": "MozillaFirefox-devel-103.0.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"product_id": "MozillaFirefox-translations-common-103.0.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"product_id": "MozillaFirefox-translations-other-103.0.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-103.0.1-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-103.0.1-1.1.ppc64le",
"product_id": "MozillaFirefox-103.0.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"product_id": "MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"product_id": "MozillaFirefox-devel-103.0.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-common-103.0.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-other-103.0.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-103.0.1-1.1.s390x",
"product": {
"name": "MozillaFirefox-103.0.1-1.1.s390x",
"product_id": "MozillaFirefox-103.0.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"product": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"product_id": "MozillaFirefox-branding-upstream-103.0.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-103.0.1-1.1.s390x",
"product": {
"name": "MozillaFirefox-devel-103.0.1-1.1.s390x",
"product_id": "MozillaFirefox-devel-103.0.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"product_id": "MozillaFirefox-translations-common-103.0.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"product_id": "MozillaFirefox-translations-other-103.0.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-103.0.1-1.1.x86_64",
"product": {
"name": "MozillaFirefox-103.0.1-1.1.x86_64",
"product_id": "MozillaFirefox-103.0.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-103.0.1-1.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-103.0.1-1.1.x86_64",
"product_id": "MozillaFirefox-devel-103.0.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"product_id": "MozillaFirefox-translations-common-103.0.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-103.0.1-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.x86_64",
"product_id": "MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-103.0.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64"
},
"product_reference": "MozillaFirefox-103.0.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-103.0.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-103.0.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-103.0.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x"
},
"product_reference": "MozillaFirefox-103.0.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-103.0.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64"
},
"product_reference": "MozillaFirefox-103.0.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64"
},
"product_reference": "MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x"
},
"product_reference": "MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-103.0.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64"
},
"product_reference": "MozillaFirefox-devel-103.0.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-103.0.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-103.0.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x"
},
"product_reference": "MozillaFirefox-devel-103.0.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-103.0.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-103.0.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-103.0.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-103.0.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-103.0.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2505"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2505",
"url": "https://www.suse.com/security/cve/CVE-2022-2505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2505"
},
{
"cve": "CVE-2022-36314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36314"
}
],
"notes": [
{
"category": "general",
"text": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36314",
"url": "https://www.suse.com/security/cve/CVE-2022-36314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36314"
},
{
"cve": "CVE-2022-36315",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36315"
}
],
"notes": [
{
"category": "general",
"text": "When loading a script with Subresource Integrity, attackers with an injection capability could trigger the reuse of previously cached entries with incorrect, different integrity metadata. This vulnerability affects Firefox \u003c 103.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36315",
"url": "https://www.suse.com/security/cve/CVE-2022-36315"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36315"
},
{
"cve": "CVE-2022-36316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36316"
}
],
"notes": [
{
"category": "general",
"text": "When using the Performance API, an attacker was able to notice subtle differences between PerformanceEntries and thus learn whether the target URL had been subject to a redirect. This vulnerability affects Firefox \u003c 103.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36316",
"url": "https://www.suse.com/security/cve/CVE-2022-36316"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36316"
},
{
"cve": "CVE-2022-36317",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36317"
}
],
"notes": [
{
"category": "general",
"text": "When visiting a website with an overly long URL, the user interface would start to hang. Due to session restore, this could lead to a permanent Denial of Service.\u003cbr\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 103.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36317",
"url": "https://www.suse.com/security/cve/CVE-2022-36317"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36317"
},
{
"cve": "CVE-2022-36318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36318"
}
],
"notes": [
{
"category": "general",
"text": "When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36318",
"url": "https://www.suse.com/security/cve/CVE-2022-36318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36318"
},
{
"cve": "CVE-2022-36319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36319"
}
],
"notes": [
{
"category": "general",
"text": "When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36319",
"url": "https://www.suse.com/security/cve/CVE-2022-36319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36319"
},
{
"cve": "CVE-2022-36320",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36320"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 103.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36320",
"url": "https://www.suse.com/security/cve/CVE-2022-36320"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-103.0.1-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-103.0.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2022-36320"
}
]
}
OPENSUSE-SU-2024:12228-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaThunderbird-102.1.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaThunderbird-102.1.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12228",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12228-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-2505 page",
"url": "https://www.suse.com/security/cve/CVE-2022-2505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36314 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36314/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36318 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36318/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-36319 page",
"url": "https://www.suse.com/security/cve/CVE-2022-36319/"
}
],
"title": "MozillaThunderbird-102.1.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12228-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-102.1.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-102.1.0-1.1.aarch64",
"product_id": "MozillaThunderbird-102.1.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"product_id": "MozillaThunderbird-translations-common-102.1.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"product": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"product_id": "MozillaThunderbird-translations-other-102.1.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-102.1.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-102.1.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-102.1.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"product": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"product_id": "MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-102.1.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-102.1.0-1.1.s390x",
"product_id": "MozillaThunderbird-102.1.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"product_id": "MozillaThunderbird-translations-common-102.1.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"product": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"product_id": "MozillaThunderbird-translations-other-102.1.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-102.1.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-102.1.0-1.1.x86_64",
"product_id": "MozillaThunderbird-102.1.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-102.1.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-102.1.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-102.1.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-102.1.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-102.1.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-102.1.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-102.1.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-102.1.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-102.1.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-102.1.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64"
},
"product_reference": "MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le"
},
"product_reference": "MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x"
},
"product_reference": "MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-102.1.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-102.1.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-2505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-2505"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 102. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-2505",
"url": "https://www.suse.com/security/cve/CVE-2022-2505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-2505"
},
{
"cve": "CVE-2022-36314",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36314"
}
],
"notes": [
{
"category": "general",
"text": "When opening a Windows shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system.\u003cbr\u003eThis bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox ESR \u003c 102.1, Firefox \u003c 103, and Thunderbird \u003c 102.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36314",
"url": "https://www.suse.com/security/cve/CVE-2022-36314"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36314"
},
{
"cve": "CVE-2022-36318",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36318"
}
],
"notes": [
{
"category": "general",
"text": "When visiting directory listings for `chrome://` URLs as source text, some parameters were reflected. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36318",
"url": "https://www.suse.com/security/cve/CVE-2022-36318"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36318"
},
{
"cve": "CVE-2022-36319",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-36319"
}
],
"notes": [
{
"category": "general",
"text": "When combining CSS properties for overflow and transform, the mouse cursor could interact with different coordinates than displayed. This vulnerability affects Firefox ESR \u003c 102.1, Firefox ESR \u003c 91.12, Firefox \u003c 103, Thunderbird \u003c 102.1, and Thunderbird \u003c 91.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-36319",
"url": "https://www.suse.com/security/cve/CVE-2022-36319"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-common-102.1.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaThunderbird-translations-other-102.1.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-36319"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.