<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3837-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-09-27T17:27:28Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-09-27T17:27:28Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-09-27T17:27:28Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575):

Security fixes:

- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683).
- CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685).
- CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599).
- CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454).
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195).

Other fixes:

  - Fix broken build with newer binutils (bsc#1215309)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production-2023-3837,Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production-2023-3837,SUSE-2023-3837,SUSE-SLE-SDK-12-SP5-2023-3837,SUSE-SLE-SERVER-12-SP5-2023-3837</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      <Description>Link for SUSE-SU-2023:3837-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-updates/2023-September/031728.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3837-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215309</URL>
      <Description>SUSE Bug 1215309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215575</URL>
      <Description>SUSE Bug 1215575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5168/</URL>
      <Description>SUSE CVE CVE-2023-5168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5169/</URL>
      <Description>SUSE CVE CVE-2023-5169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5171/</URL>
      <Description>SUSE CVE CVE-2023-5171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5174/</URL>
      <Description>SUSE CVE CVE-2023-5174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5176/</URL>
      <Description>SUSE CVE CVE-2023-5176 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5" CPE="cpe:/o:suse:sles:12:sp5">SUSE Linux Enterprise Server 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5" CPE="cpe:/o:suse:sles_sap:12:sp5">SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP5">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5" CPE="cpe:/o:suse:sle-sdk:12:sp5">SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-115.3.0-112.182.1">
      <FullProductName ProductID="MozillaFirefox-115.3.0-112.182.1">MozillaFirefox-115.3.0-112.182.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-115.3.0-112.182.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-115.3.0-112.182.1">MozillaFirefox-branding-upstream-115.3.0-112.182.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-115.3.0-112.182.1">
      <FullProductName ProductID="MozillaFirefox-devel-115.3.0-112.182.1">MozillaFirefox-devel-115.3.0-112.182.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-115.3.0-112.182.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-115.3.0-112.182.1">MozillaFirefox-translations-common-115.3.0-112.182.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-115.3.0-112.182.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-115.3.0-112.182.1">MozillaFirefox-translations-other-115.3.0-112.182.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1">MozillaFirefox-115.3.0-112.182.1 as a component of Image SLES12-SP5-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1">MozillaFirefox-115.3.0-112.182.1 as a component of Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1">MozillaFirefox-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1">MozillaFirefox-devel-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1">MozillaFirefox-translations-common-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1">MozillaFirefox-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1">MozillaFirefox-devel-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1">MozillaFirefox-translations-common-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-112.182.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP5">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1">MozillaFirefox-devel-115.3.0-112.182.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised content process could have provided malicious data to `FilterNodeD2D1` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5168.html</URL>
        <Description>CVE-2023-5168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5169.html</URL>
        <Description>CVE-2023-5169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5171.html</URL>
        <Description>CVE-2023-5171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.
*This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5174.html</URL>
        <Description>CVE-2023-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES12-SP5-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>Image SLES12-SP5-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP5:MozillaFirefox-translations-common-115.3.0-112.182.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP5:MozillaFirefox-devel-115.3.0-112.182.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233837-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5176.html</URL>
        <Description>CVE-2023-5176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
