<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2023:3899-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2023-09-29T09:27:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2023-09-29T09:27:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2023-09-29T09:27:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox fixes the following issues:

Update to Firefox Extended Support Release 115.3.0 ESR (MFSA 2023-42, bsc#1215575):

Security fixes:

- CVE-2023-5168: Out-of-bounds write in FilterNodeD2D1 (bmo#1846683).
- CVE-2023-5169: Out-of-bounds write in PathOps (bmo#1846685).
- CVE-2023-5171: Use-after-free in Ion Compiler (bmo#1851599).
- CVE-2023-5174: Double-free in process spawning on Windows (bmo#1848454).
- CVE-2023-5176: Memory safety bugs fixed in Firefox 118, Firefox ESR 115.3, and Thunderbird 115.3 (bmo#1836353, bmo#1842674, bmo#1843824, bmo#1843962, bmo#1848890, bmo#1850180, bmo#1850983, bmo#1851195).

Other fixes:

  - Fix broken build with newer binutils (bsc#1215309)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Image SLES15-SP1-SAP-Azure-LI-BYOS-Production-2023-3899,Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production-2023-3899,SUSE-2023-3899,SUSE-SLE-Product-HPC-15-SP1-LTSS-2023-3899,SUSE-SLE-Product-SLES-15-SP1-LTSS-2023-3899,SUSE-SLE-Product-SLES_SAP-15-SP1-2023-3899</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      <Description>Link for SUSE-SU-2023:3899-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2023-September/016460.html</URL>
      <Description>E-Mail link for SUSE-SU-2023:3899-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215309</URL>
      <Description>SUSE Bug 1215309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1215575</URL>
      <Description>SUSE Bug 1215575</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5168/</URL>
      <Description>SUSE CVE CVE-2023-5168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5169/</URL>
      <Description>SUSE CVE CVE-2023-5169 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5171/</URL>
      <Description>SUSE CVE CVE-2023-5171 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5174/</URL>
      <Description>SUSE CVE CVE-2023-5174 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2023-5176/</URL>
      <Description>SUSE CVE CVE-2023-5176 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Image SLES15-SP1-SAP-Azure-LI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SP1-SAP-Azure-LI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SP1-SAP-Azure-LI-BYOS-Production">Image SLES15-SP1-SAP-Azure-LI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production">
      <Branch Type="Product Name" Name="Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production">
        <FullProductName ProductID="Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production">Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS" CPE="cpe:/o:suse:sle_hpc-ltss:15:sp1">SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 15 SP1-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS" CPE="cpe:/o:suse:sles-ltss:15:sp1">SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1" CPE="cpe:/o:suse:sles_sap:15:sp1">SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-115.3.0-150000.150.107.1">
      <FullProductName ProductID="MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-115.3.0-150000.150.107.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-115.3.0-150000.150.107.1">MozillaFirefox-branding-upstream-115.3.0-150000.150.107.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-115.3.0-150000.150.107.1">
      <FullProductName ProductID="MozillaFirefox-devel-115.3.0-150000.150.107.1">MozillaFirefox-devel-115.3.0-150000.150.107.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-115.3.0-150000.150.107.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-115.3.0-150000.150.107.1">MozillaFirefox-translations-common-115.3.0-150000.150.107.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-115.3.0-150000.150.107.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-115.3.0-150000.150.107.1">MozillaFirefox-translations-other-115.3.0-150000.150.107.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP1-SAP-Azure-LI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1 as a component of Image SLES15-SP1-SAP-Azure-LI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production">
      <FullProductName ProductID="Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1 as a component of Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1">MozillaFirefox-devel-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1">MozillaFirefox-translations-common-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1">MozillaFirefox-translations-other-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1">MozillaFirefox-devel-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1">MozillaFirefox-translations-common-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 15 SP1-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1">MozillaFirefox-translations-other-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server 15 SP1-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1">MozillaFirefox-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1">MozillaFirefox-devel-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1">MozillaFirefox-translations-common-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-115.3.0-150000.150.107.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 15 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1">MozillaFirefox-translations-other-115.3.0-150000.150.107.1 as a component of SUSE Linux Enterprise Server for SAP Applications 15 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised content process could have provided malicious data to `FilterNodeD2D1` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process.
*This bug only affects Firefox on Windows. Other operating systems are unaffected.* This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5168.html</URL>
        <Description>CVE-2023-5168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised content process could have provided malicious data in a `PathRecording` resulting in an out-of-bounds write, leading to a potentially exploitable crash in a privileged process. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5169</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5169.html</URL>
        <Description>CVE-2023-5169</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During Ion compilation, a Garbage Collection could have resulted in a use-after-free condition, allowing an attacker to write two NUL bytes, and cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5171</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5171.html</URL>
        <Description>CVE-2023-5171</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If Windows failed to duplicate a handle during process creation, the sandbox code may have inadvertently freed a pointer twice, resulting in a use-after-free and a potentially exploitable crash.
*This bug only affects Firefox on Windows when run in non-standard configurations (such as using `runas`). Other operating systems are unaffected.* This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5174</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5174.html</URL>
        <Description>CVE-2023-5174</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 117, Firefox ESR 115.2, and Thunderbird 115.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 118, Firefox ESR &lt; 115.3, and Thunderbird &lt; 115.3.</Note>
    </Notes>
    <CVE>CVE-2023-5176</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLES15-SP1-SAP-Azure-LI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 15 SP1-LTSS:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-devel-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-common-115.3.0-150000.150.107.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 15 SP1:MozillaFirefox-translations-other-115.3.0-150000.150.107.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2023/suse-su-20233899-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2023-5176.html</URL>
        <Description>CVE-2023-5176</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1215575</URL>
        <Description>SUSE Bug 1215575</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
