<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:2175-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-05-11T11:09:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-05-11T11:09:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-05-11T11:09:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox fixes the following issues:

Extended Support Release 102.11.0 ESR (bsc#1211175):

- CVE-2023-32205: Browser prompts could have been obscured by popups
- CVE-2023-32206: Crash in RLBox Expat driver
- CVE-2023-32207: Potential permissions request bypass via clickjacking
- CVE-2023-32211: Content process crash due to invalid wasm code
- CVE-2023-32212: Potential spoof due to obscured address bar
- CVE-2023-32213: Potential memory corruption in FileReader::DoReadData()
- CVE-2023-32214: Potential DoS via exposed protocol handlers
- CVE-2023-32215: Memory safety bugs fixed in Firefox 113 and Firefox ESR 102.11
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-2023-2175,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-2175,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-2175,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-2175</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      <Description>Link for SUSE-SU-2023:2175-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-May/029362.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:2175-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1211175</URL>
      <Description>SUSE Bug 1211175</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32205/</URL>
      <Description>SUSE CVE CVE-2023-32205 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32206/</URL>
      <Description>SUSE CVE CVE-2023-32206 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32207/</URL>
      <Description>SUSE CVE CVE-2023-32207 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32211/</URL>
      <Description>SUSE CVE CVE-2023-32211 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32212/</URL>
      <Description>SUSE CVE CVE-2023-32212 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32213/</URL>
      <Description>SUSE CVE CVE-2023-32213 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32214/</URL>
      <Description>SUSE CVE CVE-2023-32214 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-32215/</URL>
      <Description>SUSE CVE CVE-2023-32215 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp1">SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp1">SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1" CPE="cpe:/o:suse:sles_sap:15:sp1">SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-102.11.0-150000.150.85.1">
      <FullProductName ProductID="MozillaFirefox-102.11.0-150000.150.85.1">MozillaFirefox-102.11.0-150000.150.85.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-102.11.0-150000.150.85.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-102.11.0-150000.150.85.1">MozillaFirefox-branding-upstream-102.11.0-150000.150.85.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-102.11.0-150000.150.85.1">
      <FullProductName ProductID="MozillaFirefox-devel-102.11.0-150000.150.85.1">MozillaFirefox-devel-102.11.0-150000.150.85.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-102.11.0-150000.150.85.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-102.11.0-150000.150.85.1">MozillaFirefox-translations-common-102.11.0-150000.150.85.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-102.11.0-150000.150.85.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-102.11.0-150000.150.85.1">MozillaFirefox-translations-other-102.11.0-150000.150.85.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1">MozillaFirefox-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1">MozillaFirefox-devel-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1">MozillaFirefox-translations-common-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1">MozillaFirefox-translations-other-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1">MozillaFirefox-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1">MozillaFirefox-devel-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1">MozillaFirefox-translations-common-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1">MozillaFirefox-translations-other-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1">MozillaFirefox-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1">MozillaFirefox-devel-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1">MozillaFirefox-translations-common-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-102.11.0-150000.150.85.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1">MozillaFirefox-translations-other-102.11.0-150000.150.85.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32205</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32205.html</URL>
        <Description>CVE-2023-32205</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32206</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32206.html</URL>
        <Description>CVE-2023-32206</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32207</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32207.html</URL>
        <Description>CVE-2023-32207</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32211</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32211.html</URL>
        <Description>CVE-2023-32211</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could have positioned a `datalist` element to obscure the address bar. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32212</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32212.html</URL>
        <Description>CVE-2023-32212</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32213</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32213.html</URL>
        <Description>CVE-2023-32213</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service.
*Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32214</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32214.html</URL>
        <Description>CVE-2023-32214</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members Gabriele Svelto, Andrew Osmond, Emily McDonough, Sebastian Hengst, Andrew McCreight and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 113, Firefox ESR &lt; 102.11, and Thunderbird &lt; 102.11.</Note>
    </Notes>
    <CVE>CVE-2023-32215</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-102.11.0-150000.150.85.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-102.11.0-150000.150.85.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20232175-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-32215.html</URL>
        <Description>CVE-2023-32215</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211175</URL>
        <Description>SUSE Bug 1211175</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
