Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-38472 (GCVE-0-2022-38472)
Vulnerability from cvelistv5 – Published: 2022-12-22 00:00 – Updated: 2025-04-15 16:50- Address bar spoofing via XSLT error handling
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 102.2
(custom)
Affected: unspecified , < 91.13 (custom) |
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 91.13
(custom)
Affected: unspecified , < 102.2 (custom) |
|
| Mozilla | Firefox |
Affected:
unspecified , < 104
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T10:54:03.688Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-38472",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-15T16:50:08.583029Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-346",
"description": "CWE-346 Origin Validation Error",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-15T16:50:13.366Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "102.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "91.13",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.13",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "102.2",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "104",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Address bar spoofing via XSLT error handling",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-22T00:00:00.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2022-38472",
"datePublished": "2022-12-22T00:00:00.000Z",
"dateReserved": "2022-08-19T00:00:00.000Z",
"dateUpdated": "2025-04-15T16:50:13.366Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-38472",
"date": "2026-05-20",
"epss": "0.0017",
"percentile": "0.37788"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"104.0\", \"matchCriteriaId\": \"70DE2928-97D5-4674-9A65-11445420644E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"102.0\", \"versionEndExcluding\": \"102.2\", \"matchCriteriaId\": \"F41299AA-8263-4589-A162-B01BFF5D0125\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.13\", \"matchCriteriaId\": \"AB7B5641-427F-4682-94D0-E88C20613D05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"102.0\", \"versionEndExcluding\": \"102.2\", \"matchCriteriaId\": \"C55A8FB2-E22B-443C-93FF-A8D2DCE85585\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\"}, {\"lang\": \"es\", \"value\": \"Un atacante podr\\u00eda haber abusado del manejo de errores XSLT para asociar contenido controlado por el atacante con otro origen que se mostraba en la barra de direcciones. Esto podr\\u00eda haberse utilizado para enga\\u00f1ar al usuario para que env\\u00ede datos destinados al origen falsificado. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 102.2, Thunderbird \u0026lt; 91.13, Firefox ESR \u0026lt; 91.13, Firefox ESR \u0026lt; 102.2 y Firefox \u0026lt; 104.\"}]",
"id": "CVE-2022-38472",
"lastModified": "2024-11-21T07:16:32.760",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}]}",
"published": "2022-12-22T20:15:36.237",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-33/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-34/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-35/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-36/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-37/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-33/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-34/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-35/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-36/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-37/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-346\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-38472\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2022-12-22T20:15:36.237\",\"lastModified\":\"2025-04-15T17:15:36.150\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\"},{\"lang\":\"es\",\"value\":\"Un atacante podr\u00eda haber abusado del manejo de errores XSLT para asociar contenido controlado por el atacante con otro origen que se mostraba en la barra de direcciones. Esto podr\u00eda haberse utilizado para enga\u00f1ar al usuario para que env\u00ede datos destinados al origen falsificado. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 102.2, Thunderbird \u0026lt; 91.13, Firefox ESR \u0026lt; 91.13, Firefox ESR \u0026lt; 102.2 y Firefox \u0026lt; 104.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-346\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"104.0\",\"matchCriteriaId\":\"70DE2928-97D5-4674-9A65-11445420644E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"102.0\",\"versionEndExcluding\":\"102.2\",\"matchCriteriaId\":\"F41299AA-8263-4589-A162-B01BFF5D0125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.13\",\"matchCriteriaId\":\"AB7B5641-427F-4682-94D0-E88C20613D05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"102.0\",\"versionEndExcluding\":\"102.2\",\"matchCriteriaId\":\"C55A8FB2-E22B-443C-93FF-A8D2DCE85585\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-33/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-34/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-35/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-36/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-37/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-33/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-34/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-35/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-36/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-37/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-35/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-33/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-37/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-36/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-34/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T10:54:03.688Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-38472\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-15T16:50:08.583029Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-346\", \"description\": \"CWE-346 Origin Validation Error\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-15T16:49:51.587Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Thunderbird\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"102.2\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"91.13\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox ESR\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"91.13\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"102.2\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox\", \"versions\": [{\"status\": \"affected\", \"version\": \"unspecified\", \"lessThan\": \"104\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-35/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-33/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-37/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-36/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-34/\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1769155\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Address bar spoofing via XSLT error handling\"}]}], \"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2022-12-22T00:00:00.000Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2022-38472\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-04-15T16:50:13.366Z\", \"dateReserved\": \"2022-08-19T00:00:00.000Z\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"datePublished\": \"2022-12-22T00:00:00.000Z\", \"assignerShortName\": \"mozilla\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-765
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 102.2 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.13 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 91.13 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 102.2 | ||
| Mozilla | Firefox | Firefox versions antérieures à 104 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 102.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.13",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.13",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 102.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 104",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38477"
},
{
"name": "CVE-2022-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38472"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2022-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38474"
},
{
"name": "CVE-2022-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38473"
},
{
"name": "CVE-2022-38475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38475"
},
{
"name": "CVE-2022-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38478"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-33/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-37/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-35/"
}
],
"reference": "CERTFR-2022-AVI-765",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire\u00a0\u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-33 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-34 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-35 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-37 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-36 du 23 ao\u00fbt 2022",
"url": null
}
]
}
CERTFR-2022-AVI-765
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans Mozilla. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 102.2 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 91.13 | ||
| Mozilla | Firefox ESR | Firefox ESR versions antérieures à 91.13 | ||
| Mozilla | Thunderbird | Thunderbird versions antérieures à 102.2 | ||
| Mozilla | Firefox | Firefox versions antérieures à 104 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 102.2",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 91.13",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 91.13",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Thunderbird versions ant\u00e9rieures \u00e0 102.2",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 104",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38477"
},
{
"name": "CVE-2022-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38472"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2022-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38474"
},
{
"name": "CVE-2022-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38473"
},
{
"name": "CVE-2022-38475",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38475"
},
{
"name": "CVE-2022-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38478"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-34/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-33/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-36/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-37/"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla du 23 ao\u00fbt 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-35/"
}
],
"reference": "CERTFR-2022-AVI-765",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-08-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eMozilla\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire\u00a0\u00e0 distance et un\ncontournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Mozilla",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-33 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-34 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-35 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-37 du 23 ao\u00fbt 2022",
"url": null
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-36 du 23 ao\u00fbt 2022",
"url": null
}
]
}
alsa-2022:6164
Vulnerability from osv_almalinux
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.13.0. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "thunderbird"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.13.0-1.el8_6.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\nThis update upgrades Thunderbird to version 91.13.0.\nSecurity Fix(es):\n* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472)\n* Mozilla: Cross-origin XSLT Documents would have inherited the parent\u0027s permissions (CVE-2022-38473)\n* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477)\n* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478)\n* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:6164",
"modified": "2022-08-30T19:26:04Z",
"published": "2022-08-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6164"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38472"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38473"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38477"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120673"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120674"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120678"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120695"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120696"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-6164.html"
}
],
"related": [
"CVE-2022-38472",
"CVE-2022-38473",
"CVE-2022-38477",
"CVE-2022-38478",
"CVE-2022-38476"
],
"summary": "Important: thunderbird security update"
}
alsa-2022:6165
Vulnerability from osv_almalinux
Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 91.13.0. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "thunderbird"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.13.0-1.el9_0.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\nThis update upgrades Thunderbird to version 91.13.0.\nSecurity Fix(es):\n* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472)\n* Mozilla: Cross-origin XSLT Documents would have inherited the parent\u0027s permissions (CVE-2022-38473)\n* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477)\n* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478)\n* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:6165",
"modified": "2022-08-30T19:29:21Z",
"published": "2022-08-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6165"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38472"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38473"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38477"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120673"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120674"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120678"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120695"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120696"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2022-6165.html"
}
],
"related": [
"CVE-2022-38472",
"CVE-2022-38473",
"CVE-2022-38477",
"CVE-2022-38478",
"CVE-2022-38476"
],
"summary": "Important: thunderbird security update"
}
alsa-2022:6174
Vulnerability from osv_almalinux
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.13.0 ESR. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:9",
"name": "firefox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.13.0-1.el9_0.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\nThis update upgrades Firefox to version 91.13.0 ESR.\nSecurity Fix(es):\n* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472)\n* Mozilla: Cross-origin XSLT Documents would have inherited the parent\u0027s permissions (CVE-2022-38473)\n* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477)\n* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478)\n* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:6174",
"modified": "2022-08-30T14:56:43Z",
"published": "2022-08-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6174"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38472"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38473"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38477"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120673"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120674"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120678"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120695"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120696"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/9/ALSA-2022-6174.html"
}
],
"related": [
"CVE-2022-38472",
"CVE-2022-38473",
"CVE-2022-38477",
"CVE-2022-38478",
"CVE-2022-38476"
],
"summary": "Important: firefox security update"
}
alsa-2022:6175
Vulnerability from osv_almalinux
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 91.13.0 ESR. Security Fix(es): * Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472) * Mozilla: Cross-origin XSLT Documents would have inherited the parent's permissions (CVE-2022-38473) * Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477) * Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478) * Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "firefox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.13.0-1.el8_6.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\nThis update upgrades Firefox to version 91.13.0 ESR.\nSecurity Fix(es):\n* Mozilla: Address bar spoofing via XSLT error handling (CVE-2022-38472)\n* Mozilla: Cross-origin XSLT Documents would have inherited the parent\u0027s permissions (CVE-2022-38473)\n* Mozilla: Memory safety bugs fixed in Firefox 104 and Firefox ESR 102.2 (CVE-2022-38477)\n* Mozilla: Memory safety bugs fixed in Firefox 104, Firefox ESR 102.2, and Firefox ESR 91.13 (CVE-2022-38478)\n* Mozilla: Data race and potential use-after-free in PK11_ChangePW (CVE-2022-38476)\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:6175",
"modified": "2022-08-30T19:08:42Z",
"published": "2022-08-24T00:00:00Z",
"references": [
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6175"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38472"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38473"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38476"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38477"
},
{
"type": "REPORT",
"url": "https://access.redhat.com/security/cve/CVE-2022-38478"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120673"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120674"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120678"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120695"
},
{
"type": "REPORT",
"url": "https://bugzilla.redhat.com/2120696"
},
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-6175.html"
}
],
"related": [
"CVE-2022-38472",
"CVE-2022-38473",
"CVE-2022-38477",
"CVE-2022-38478",
"CVE-2022-38476"
],
"summary": "Important: firefox security update"
}
FKIE_CVE-2022-38472
Vulnerability from fkie_nvd - Published: 2022-12-22 20:15 - Updated: 2025-04-15 17:156.5 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1769155 | Issue Tracking, Permissions Required, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-33/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-34/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-35/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-36/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-37/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1769155 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-33/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-34/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-35/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-36/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-37/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox | * | |
| mozilla | thunderbird | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "70DE2928-97D5-4674-9A65-11445420644E",
"versionEndExcluding": "104.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F41299AA-8263-4589-A162-B01BFF5D0125",
"versionEndExcluding": "102.2",
"versionStartIncluding": "102.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "AB7B5641-427F-4682-94D0-E88C20613D05",
"versionEndExcluding": "91.13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C55A8FB2-E22B-443C-93FF-A8D2DCE85585",
"versionEndExcluding": "102.2",
"versionStartIncluding": "102.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104."
},
{
"lang": "es",
"value": "Un atacante podr\u00eda haber abusado del manejo de errores XSLT para asociar contenido controlado por el atacante con otro origen que se mostraba en la barra de direcciones. Esto podr\u00eda haberse utilizado para enga\u00f1ar al usuario para que env\u00ede datos destinados al origen falsificado. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 102.2, Thunderbird \u0026lt; 91.13, Firefox ESR \u0026lt; 91.13, Firefox ESR \u0026lt; 102.2 y Firefox \u0026lt; 104."
}
],
"id": "CVE-2022-38472",
"lastModified": "2025-04-15T17:15:36.150",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-12-22T20:15:36.237",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-RR53-G8M7-WRVF
Vulnerability from github – Published: 2022-12-22 21:30 – Updated: 2024-10-21 15:32An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird < 102.2, Thunderbird < 91.13, Firefox ESR < 91.13, Firefox ESR < 102.2, and Firefox < 104.
{
"affected": [],
"aliases": [
"CVE-2022-38472"
],
"database_specific": {
"cwe_ids": [
"CWE-346"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T20:15:00Z",
"severity": "MODERATE"
},
"details": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"id": "GHSA-rr53-g8m7-wrvf",
"modified": "2024-10-21T15:32:25Z",
"published": "2022-12-22T21:30:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-38472"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2022-38472
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-38472",
"description": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"id": "GSD-2022-38472"
},
"gsd": {
"affected": [
{
"package": {
"ecosystem": "Mozilla",
"name": "Thunderbird"
},
"ranges": [
{
"events": [
{
"fixed": "91.13"
},
{
"introduced": "0"
},
{
"fixed": "102.2"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox ESR"
},
"ranges": [
{
"events": [
{
"fixed": "102.2"
},
{
"introduced": "0"
},
{
"fixed": "91.13"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox"
},
"ranges": [
{
"events": [
{
"fixed": "104"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
}
],
"alias": [
"CVE-2022-38472"
],
"database_specific": {
"GSD": {
"alias": "CVE-2022-38472",
"id": "GSD-2022-38472",
"references": [
"https://advisories.mageia.org/CVE-2022-38472.html",
"https://access.redhat.com/errata/RHSA-2022:6164",
"https://access.redhat.com/errata/RHSA-2022:6165",
"https://access.redhat.com/errata/RHSA-2022:6166",
"https://access.redhat.com/errata/RHSA-2022:6167",
"https://access.redhat.com/errata/RHSA-2022:6168",
"https://access.redhat.com/errata/RHSA-2022:6169",
"https://access.redhat.com/errata/RHSA-2022:6174",
"https://access.redhat.com/errata/RHSA-2022:6175",
"https://access.redhat.com/errata/RHSA-2022:6176",
"https://access.redhat.com/errata/RHSA-2022:6177",
"https://access.redhat.com/errata/RHSA-2022:6178",
"https://access.redhat.com/errata/RHSA-2022:6179",
"https://www.suse.com/security/cve/CVE-2022-38472.html",
"https://ubuntu.com/security/CVE-2022-38472",
"https://www.debian.org/security/2022/dsa-5217",
"https://www.debian.org/security/2022/dsa-5221"
]
}
},
"details": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 91.13, Thunderbird \u003c 102.2, Firefox ESR \u003c 102.2, Firefox ESR \u003c 91.13, and Firefox \u003c 104.",
"id": "GSD-2022-38472",
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"modified": "2022-09-27T16:35:15.567274Z",
"osvSchema": {
"aliases": [
"CVE-2022-38472"
],
"details": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"id": "GSD-2022-38472",
"modified": "2023-12-13T01:19:22.344074Z",
"schema_version": "1.4.0"
},
"references": [
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"type": "ADVISORY",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
},
{
"type": "ADVISORY",
"url": "https://advisories.mageia.org/CVE-2022-38472.html"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6164"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6165"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6166"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6167"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6168"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6169"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6174"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6175"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6176"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6177"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6178"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:6179"
},
{
"type": "ADVISORY",
"url": "https://www.suse.com/security/cve/CVE-2022-38472.html"
},
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/CVE-2022-38472"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5217"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5221"
}
],
"schema_version": "1.3.0",
"summary": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 91.13, Thunderbird \u003c 102.2, Firefox ESR \u003c 102.2, Firefox ESR \u003c 91.13, and Firefox \u003c 104."
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-38472",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.2"
},
{
"version_affected": "\u003c",
"version_value": "91.13"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.13"
},
{
"version_affected": "\u003c",
"version_value": "102.2"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "104"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Address bar spoofing via XSLT error handling"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-35/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-33/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-37/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-36/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-34/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-38472"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.13"
},
{
"version_affected": "\u003c",
"version_value": "102.2"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "102.2"
},
{
"version_affected": "\u003c",
"version_value": "91.13"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "104"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 91.13, Thunderbird \u003c 102.2, Firefox ESR \u003c 102.2, Firefox ESR \u003c 91.13, and Firefox \u003c 104."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Address bar spoofing via XSLT error handling"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "102.2",
"versionStartIncluding": "102.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.13",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "102.2",
"versionStartIncluding": "102.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "104.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-38472"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-35/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-35/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-34/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-34/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-33/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-33/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-37/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-37/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-36/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-36/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1769155"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-01-03T21:13Z",
"publishedDate": "2022-12-22T20:15Z"
}
}
}
OPENSUSE-SU-2024:12286-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2022-38472/ | self |
| https://www.suse.com/security/cve/CVE-2022-38473/ | self |
| https://www.suse.com/security/cve/CVE-2022-38474/ | self |
| https://www.suse.com/security/cve/CVE-2022-38475/ | self |
| https://www.suse.com/security/cve/CVE-2022-38477/ | self |
| https://www.suse.com/security/cve/CVE-2022-38478/ | self |
| https://www.suse.com/security/cve/CVE-2022-38472 | external |
| https://bugzilla.suse.com/1202645 | external |
| https://bugzilla.suse.com/1205832 | external |
| https://www.suse.com/security/cve/CVE-2022-38473 | external |
| https://bugzilla.suse.com/1202645 | external |
| https://www.suse.com/security/cve/CVE-2022-38474 | external |
| https://bugzilla.suse.com/1202645 | external |
| https://www.suse.com/security/cve/CVE-2022-38475 | external |
| https://bugzilla.suse.com/1202645 | external |
| https://www.suse.com/security/cve/CVE-2022-38477 | external |
| https://bugzilla.suse.com/1202645 | external |
| https://www.suse.com/security/cve/CVE-2022-38478 | external |
| https://bugzilla.suse.com/1202645 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaFirefox-104.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaFirefox-104.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12286",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12286-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38472 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38472/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38473 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38473/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38474 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38474/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38475 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38475/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38477 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38477/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-38478 page",
"url": "https://www.suse.com/security/cve/CVE-2022-38478/"
}
],
"title": "MozillaFirefox-104.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12286-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-104.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-104.0-1.1.aarch64",
"product_id": "MozillaFirefox-104.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"product_id": "MozillaFirefox-branding-upstream-104.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-104.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-devel-104.0-1.1.aarch64",
"product_id": "MozillaFirefox-devel-104.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-104.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-common-104.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-common-104.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-104.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-other-104.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-other-104.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-104.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-104.0-1.1.ppc64le",
"product_id": "MozillaFirefox-104.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"product_id": "MozillaFirefox-branding-upstream-104.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-104.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-devel-104.0-1.1.ppc64le",
"product_id": "MozillaFirefox-devel-104.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-common-104.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-other-104.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-104.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-104.0-1.1.s390x",
"product_id": "MozillaFirefox-104.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"product_id": "MozillaFirefox-branding-upstream-104.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-104.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-devel-104.0-1.1.s390x",
"product_id": "MozillaFirefox-devel-104.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-104.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-common-104.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-common-104.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-104.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-other-104.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-other-104.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-104.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-104.0-1.1.x86_64",
"product_id": "MozillaFirefox-104.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-104.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-104.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-104.0-1.1.x86_64",
"product_id": "MozillaFirefox-devel-104.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-104.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-104.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-common-104.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-104.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-104.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-other-104.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-104.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-104.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-104.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-104.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-104.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-104.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-104.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-104.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-104.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-104.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-devel-104.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-104.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-devel-104.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-104.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-devel-104.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-104.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-104.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-104.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-common-104.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-104.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-104.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-common-104.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-104.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-104.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-104.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-other-104.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-104.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-104.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-other-104.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-104.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-104.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-38472",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38472"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have abused XSLT error handling to associate attacker-controlled content with another origin which was displayed in the address bar. This could have been used to fool the user into submitting data intended for the spoofed origin. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38472",
"url": "https://www.suse.com/security/cve/CVE-2022-38472"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38472",
"url": "https://bugzilla.suse.com/1202645"
},
{
"category": "external",
"summary": "SUSE Bug 1205832 for CVE-2022-38472",
"url": "https://bugzilla.suse.com/1205832"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38472"
},
{
"cve": "CVE-2022-38473",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38473"
}
],
"notes": [
{
"category": "general",
"text": "A cross-origin iframe referencing an XSLT document would inherit the parent domain\u0027s permissions (such as microphone or camera access). This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38473",
"url": "https://www.suse.com/security/cve/CVE-2022-38473"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38473",
"url": "https://bugzilla.suse.com/1202645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38473"
},
{
"cve": "CVE-2022-38474",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38474"
}
],
"notes": [
{
"category": "general",
"text": "A website that had permission to access the microphone could record audio without the audio notification being shown. This bug does not allow the attacker to bypass the permission prompt - it only affects the notification shown once permission has been granted.\u003cbr /\u003e*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38474",
"url": "https://www.suse.com/security/cve/CVE-2022-38474"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38474",
"url": "https://bugzilla.suse.com/1202645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38474"
},
{
"cve": "CVE-2022-38475",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38475"
}
],
"notes": [
{
"category": "general",
"text": "An attacker could have written a value to the first element in a zero-length JavaScript array. Although the array was zero-length, the value was not written to an invalid memory address. This vulnerability affects Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38475",
"url": "https://www.suse.com/security/cve/CVE-2022-38475"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38475",
"url": "https://bugzilla.suse.com/1202645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38475"
},
{
"cve": "CVE-2022-38477",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38477"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developer Nika Layzell and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103 and Firefox ESR 102.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 102.2, Thunderbird \u003c 102.2, and Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38477",
"url": "https://www.suse.com/security/cve/CVE-2022-38477"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38477",
"url": "https://bugzilla.suse.com/1202645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38477"
},
{
"cve": "CVE-2022-38478",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-38478"
}
],
"notes": [
{
"category": "general",
"text": "Members the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 103, Firefox ESR 102.1, and Firefox ESR 91.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 102.2, Thunderbird \u003c 91.13, Firefox ESR \u003c 91.13, Firefox ESR \u003c 102.2, and Firefox \u003c 104.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-38478",
"url": "https://www.suse.com/security/cve/CVE-2022-38478"
},
{
"category": "external",
"summary": "SUSE Bug 1202645 for CVE-2022-38478",
"url": "https://bugzilla.suse.com/1202645"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-104.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-104.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-38478"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.