Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2022-29911 (GCVE-0-2022-29911)
Vulnerability from cvelistv5 – Published: 2022-12-22 00:00 – Updated: 2025-04-16 13:58- iframe Sandbox bypass
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Thunderbird |
Affected:
unspecified , < 91.9
(custom)
|
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 91.9
(custom)
|
|
| Mozilla | Firefox |
Affected:
unspecified , < 100
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T06:33:43.062Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"tags": [
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-29911",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T13:58:31.108896Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1021",
"description": "CWE-1021 Improper Restriction of Rendered UI Layers or Frames",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T13:58:35.577Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "91.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "100",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "iframe Sandbox bypass",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-22T00:00:00.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2022-29911",
"datePublished": "2022-12-22T00:00:00.000Z",
"dateReserved": "2022-04-29T00:00:00.000Z",
"dateUpdated": "2025-04-16T13:58:35.577Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2022-29911",
"date": "2026-05-20",
"epss": "0.00317",
"percentile": "0.54821"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"100.0\", \"matchCriteriaId\": \"90899DEB-2CF7-4711-9623-761107B34599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.9\", \"matchCriteriaId\": \"395AD0CF-F295-41B7-8C4A-86A9F352E5C8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"91.9\", \"matchCriteriaId\": \"C744FA6B-992E-48FC-955D-DDB61185C4A9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\"}, {\"lang\": \"es\", \"value\": \"Una implementaci\\u00f3n incorrecta de la nueva palabra clave de iframe sandbox \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e podr\\u00eda provocar la ejecuci\\u00f3n del script sin que \u003ccode\u003eallow-scripts\u003c/code\u003e est\\u00e9 presente. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.9, Firefox ESR \u0026lt; 91.9 y Firefox \u0026lt; 100.\"}]",
"id": "CVE-2022-29911",
"lastModified": "2024-11-21T06:59:57.560",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}]}",
"published": "2022-12-22T20:15:25.803",
"references": "[{\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-16/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-17/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-18/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-16/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-17/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-18/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-1021\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2022-29911\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2022-12-22T20:15:25.803\",\"lastModified\":\"2025-04-16T14:15:21.093\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\"},{\"lang\":\"es\",\"value\":\"Una implementaci\u00f3n incorrecta de la nueva palabra clave de iframe sandbox \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e podr\u00eda provocar la ejecuci\u00f3n del script sin que \u003ccode\u003eallow-scripts\u003c/code\u003e est\u00e9 presente. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.9, Firefox ESR \u0026lt; 91.9 y Firefox \u0026lt; 100.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1021\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-1021\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"100.0\",\"matchCriteriaId\":\"90899DEB-2CF7-4711-9623-761107B34599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.9\",\"matchCriteriaId\":\"395AD0CF-F295-41B7-8C4A-86A9F352E5C8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"91.9\",\"matchCriteriaId\":\"C744FA6B-992E-48FC-955D-DDB61185C4A9\"}]}]}],\"references\":[{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-16/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-17/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-18/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-16/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-17/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2022-18/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"cna\": {\"providerMetadata\": {\"orgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"shortName\": \"mozilla\", \"dateUpdated\": \"2022-12-22T00:00:00.000Z\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.\"}], \"affected\": [{\"vendor\": \"Mozilla\", \"product\": \"Thunderbird\", \"versions\": [{\"version\": \"unspecified\", \"lessThan\": \"91.9\", \"status\": \"affected\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox ESR\", \"versions\": [{\"version\": \"unspecified\", \"lessThan\": \"91.9\", \"status\": \"affected\", \"versionType\": \"custom\"}]}, {\"vendor\": \"Mozilla\", \"product\": \"Firefox\", \"versions\": [{\"version\": \"unspecified\", \"lessThan\": \"100\", \"status\": \"affected\", \"versionType\": \"custom\"}]}], \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-16/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-18/\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-17/\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\"}], \"problemTypes\": [{\"descriptions\": [{\"type\": \"text\", \"lang\": \"en\", \"description\": \"iframe Sandbox bypass\"}]}]}, \"adp\": [{\"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T06:33:43.062Z\"}, \"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-16/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-18/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2022-17/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1761981\", \"tags\": [\"x_transferred\"]}]}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2022-29911\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T13:58:31.108896Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-1021\", \"description\": \"CWE-1021 Improper Restriction of Rendered UI Layers or Frames\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T13:58:26.654Z\"}}]}",
"cveMetadata": "{\"state\": \"PUBLISHED\", \"cveId\": \"CVE-2022-29911\", \"assignerOrgId\": \"f16b083a-5664-49f3-a51e-8d479e5ed7fe\", \"assignerShortName\": \"mozilla\", \"dateUpdated\": \"2025-04-16T13:58:35.577Z\", \"dateReserved\": \"2022-04-29T00:00:00.000Z\", \"datePublished\": \"2022-12-22T00:00:00.000Z\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2022-AVI-409
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Mozilla Firefox ESR versions antérieures à 91.9 | ||
| Mozilla | Firefox ESR | Mozilla Firefox versions antérieures à 100 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox ESR versions ant\u00e9rieures \u00e0 91.9",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Firefox versions ant\u00e9rieures \u00e0 100",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29917"
},
{
"name": "CVE-2022-29912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29912"
},
{
"name": "CVE-2022-29910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29910"
},
{
"name": "CVE-2022-29914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29914"
},
{
"name": "CVE-2022-29918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29918"
},
{
"name": "CVE-2022-29915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29915"
},
{
"name": "CVE-2022-29911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29911"
},
{
"name": "CVE-2022-29909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29909"
},
{
"name": "CVE-2022-29916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29916"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-409",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox et Firefox ESR",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-16 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-17 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17/"
}
]
}
CERTFR-2022-AVI-420
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 91.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 91.9",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29917"
},
{
"name": "CVE-2022-29912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29912"
},
{
"name": "CVE-2022-29914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29914"
},
{
"name": "CVE-2022-29913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29913"
},
{
"name": "CVE-2022-29911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29911"
},
{
"name": "CVE-2022-29909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29909"
},
{
"name": "CVE-2022-29916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29916"
},
{
"name": "CVE-2022-1520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1520"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-18 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18/"
}
]
}
CERTFR-2022-AVI-409
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Firefox ESR | Mozilla Firefox ESR versions antérieures à 91.9 | ||
| Mozilla | Firefox ESR | Mozilla Firefox versions antérieures à 100 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Firefox ESR versions ant\u00e9rieures \u00e0 91.9",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Mozilla Firefox versions ant\u00e9rieures \u00e0 100",
"product": {
"name": "Firefox ESR",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29917"
},
{
"name": "CVE-2022-29912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29912"
},
{
"name": "CVE-2022-29910",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29910"
},
{
"name": "CVE-2022-29914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29914"
},
{
"name": "CVE-2022-29918",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29918"
},
{
"name": "CVE-2022-29915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29915"
},
{
"name": "CVE-2022-29911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29911"
},
{
"name": "CVE-2022-29909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29909"
},
{
"name": "CVE-2022-29916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29916"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-409",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un contournement de la politique de\ns\u00e9curit\u00e9 et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox et Firefox ESR",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-16 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-16/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-17 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-17/"
}
]
}
CERTFR-2022-AVI-420
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Thunderbird. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Mozilla | Thunderbird | Mozilla Thunderbird versions antérieures à 91.9 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Mozilla Thunderbird versions ant\u00e9rieures \u00e0 91.9",
"product": {
"name": "Thunderbird",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2022-29917",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29917"
},
{
"name": "CVE-2022-29912",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29912"
},
{
"name": "CVE-2022-29914",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29914"
},
{
"name": "CVE-2022-29913",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29913"
},
{
"name": "CVE-2022-29911",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29911"
},
{
"name": "CVE-2022-29909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29909"
},
{
"name": "CVE-2022-29916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29916"
},
{
"name": "CVE-2022-1520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1520"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-420",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-05-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla\nThunderbird. Certaines d\u0027entre elles permettent \u00e0 un attaquant de\nprovoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une\nex\u00e9cution de code arbitraire et un contournement de la politique de\ns\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Thunderbird",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa2022-18 du 03 mai 2022",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2022-18/"
}
]
}
alsa-2022:1705
Vulnerability from osv_almalinux
Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.
This update upgrades Firefox to version 91.9.0 ESR.
Security Fix(es):
-
Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909)
-
Mozilla: iframe Sandbox bypass (CVE-2022-29911)
-
Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914)
-
Mozilla: Leaking browser history with CSS variables (CVE-2022-29916)
-
Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917)
-
Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "firefox"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.9.0-1.el8_5.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability.\n\nThis update upgrades Firefox to version 91.9.0 ESR.\n\nSecurity Fix(es):\n\n* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909)\n\n* Mozilla: iframe Sandbox bypass (CVE-2022-29911)\n\n* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914)\n\n* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916)\n\n* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917)\n\n* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:1705",
"modified": "2022-05-05T12:27:24Z",
"published": "2022-05-04T11:04:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1705.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29909"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29911"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29912"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29914"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29916"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29917"
}
],
"related": [
"CVE-2022-29909",
"CVE-2022-29911",
"CVE-2022-29914",
"CVE-2022-29916",
"CVE-2022-29917",
"CVE-2022-29912"
],
"summary": "Important: firefox security update"
}
alsa-2022:1730
Vulnerability from osv_almalinux
Mozilla Thunderbird is a standalone mail and newsgroup client.
This update upgrades Thunderbird to version 91.9.0.
Security Fix(es):
-
Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909)
-
Mozilla: iframe Sandbox bypass (CVE-2022-29911)
-
Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914)
-
Mozilla: Leaking browser history with CSS variables (CVE-2022-29916)
-
Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917)
-
Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912)
-
Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913)
-
Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
| URL | Type | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"affected": [
{
"package": {
"ecosystem": "AlmaLinux:8",
"name": "thunderbird"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "91.9.0-3.el8_5.alma"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"details": "Mozilla Thunderbird is a standalone mail and newsgroup client.\n\nThis update upgrades Thunderbird to version 91.9.0.\n\nSecurity Fix(es):\n\n* Mozilla: Bypassing permission prompt in nested browsing contexts (CVE-2022-29909)\n\n* Mozilla: iframe Sandbox bypass (CVE-2022-29911)\n\n* Mozilla: Fullscreen notification bypass using popups (CVE-2022-29914)\n\n* Mozilla: Leaking browser history with CSS variables (CVE-2022-29916)\n\n* Mozilla: Memory safety bugs fixed in Firefox 100 and Firefox ESR 91.9 (CVE-2022-29917)\n\n* Mozilla: Reader mode bypassed SameSite cookies (CVE-2022-29912)\n\n* Mozilla: Speech Synthesis feature not properly disabled (CVE-2022-29913)\n\n* Mozilla: Incorrect security status shown after viewing an attached email (CVE-2022-1520)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"id": "ALSA-2022:1730",
"modified": "2022-05-07T14:41:41Z",
"published": "2022-05-05T13:32:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://errata.almalinux.org/8/ALSA-2022-1730.html"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-1520"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29909"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29911"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29912"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29913"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29914"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29916"
},
{
"type": "REPORT",
"url": "https://vulners.com/cve/CVE-2022-29917"
}
],
"related": [
"CVE-2022-29909",
"CVE-2022-29911",
"CVE-2022-29914",
"CVE-2022-29916",
"CVE-2022-29917",
"CVE-2022-29912",
"CVE-2022-29913",
"CVE-2022-1520"
],
"summary": "Important: thunderbird security update"
}
FKIE_CVE-2022-29911
Vulnerability from fkie_nvd - Published: 2022-12-22 20:15 - Updated: 2025-04-16 14:156.1 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
| URL | Tags | ||
|---|---|---|---|
| security@mozilla.org | https://bugzilla.mozilla.org/show_bug.cgi?id=1761981 | Issue Tracking, Permissions Required, Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-16/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-17/ | Vendor Advisory | |
| security@mozilla.org | https://www.mozilla.org/security/advisories/mfsa2022-18/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.mozilla.org/show_bug.cgi?id=1761981 | Issue Tracking, Permissions Required, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-16/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-17/ | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.mozilla.org/security/advisories/mfsa2022-18/ | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "90899DEB-2CF7-4711-9623-761107B34599",
"versionEndExcluding": "100.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "395AD0CF-F295-41B7-8C4A-86A9F352E5C8",
"versionEndExcluding": "91.9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C744FA6B-992E-48FC-955D-DDB61185C4A9",
"versionEndExcluding": "91.9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100."
},
{
"lang": "es",
"value": "Una implementaci\u00f3n incorrecta de la nueva palabra clave de iframe sandbox \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e podr\u00eda provocar la ejecuci\u00f3n del script sin que \u003ccode\u003eallow-scripts\u003c/code\u003e est\u00e9 presente. Esta vulnerabilidad afecta a Thunderbird \u0026lt; 91.9, Firefox ESR \u0026lt; 91.9 y Firefox \u0026lt; 100."
}
],
"id": "CVE-2022-29911",
"lastModified": "2025-04-16T14:15:21.093",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-12-22T20:15:25.803",
"references": [
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-2PJX-V75H-827M
Vulnerability from github – Published: 2022-12-22 21:30 – Updated: 2025-04-16 15:34An improper implementation of the new iframe sandbox keyword allow-top-navigation-by-user-activation could lead to script execution without allow-scripts being present. This vulnerability affects Thunderbird < 91.9, Firefox ESR < 91.9, and Firefox < 100.
{
"affected": [],
"aliases": [
"CVE-2022-29911"
],
"database_specific": {
"cwe_ids": [
"CWE-1021"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2022-12-22T20:15:00Z",
"severity": "MODERATE"
},
"details": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"id": "GHSA-2pjx-v75h-827m",
"modified": "2025-04-16T15:34:08Z",
"published": "2022-12-22T21:30:29Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-29911"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2022-29911
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2022-29911",
"id": "GSD-2022-29911"
},
"gsd": {
"affected": [
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox ESR"
},
"ranges": [
{
"events": [
{
"fixed": "91.9"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Thunderbird"
},
"ranges": [
{
"events": [
{
"fixed": "91.9"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
},
{
"package": {
"ecosystem": "Mozilla",
"name": "Firefox"
},
"ranges": [
{
"events": [
{
"fixed": "100"
},
{
"introduced": "0"
}
],
"type": "SEMVER"
}
],
"version": []
}
],
"alias": [
"CVE-2022-29911"
],
"database_specific": {
"GSD": {
"alias": "CVE-2022-29911",
"id": "GSD-2022-29911",
"references": [
"https://security.archlinux.org/CVE-2022-29911",
"https://www.debian.org/security/2022/dsa-5129",
"https://www.debian.org/security/2022/dsa-5141",
"https://advisories.mageia.org/CVE-2022-29911.html",
"https://linux.oracle.com/cve/CVE-2022-29911.html",
"https://access.redhat.com/errata/RHSA-2022:1701",
"https://access.redhat.com/errata/RHSA-2022:1702",
"https://access.redhat.com/errata/RHSA-2022:1703",
"https://access.redhat.com/errata/RHSA-2022:1704",
"https://access.redhat.com/errata/RHSA-2022:1705",
"https://access.redhat.com/errata/RHSA-2022:1724",
"https://access.redhat.com/errata/RHSA-2022:1725",
"https://access.redhat.com/errata/RHSA-2022:1726",
"https://access.redhat.com/errata/RHSA-2022:1727",
"https://access.redhat.com/errata/RHSA-2022:1730",
"https://access.redhat.com/errata/RHSA-2022:4589",
"https://access.redhat.com/errata/RHSA-2022:4590",
"https://www.suse.com/security/cve/CVE-2022-29911.html",
"https://ubuntu.com/security/CVE-2022-29911"
]
}
},
"details": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Firefox ESR \u003c 91.9, Thunderbird \u003c 91.9, and Firefox \u003c 100.",
"id": "GSD-2022-29911",
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"modified": "2022-09-27T16:35:16.753401Z",
"osvSchema": {
"aliases": [
"CVE-2022-29911"
],
"details": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"id": "GSD-2022-29911",
"modified": "2023-12-13T01:19:42.192551Z",
"schema_version": "1.4.0"
},
"references": [
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"type": "ADVISORY",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"type": "ADVISORY",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
},
{
"type": "ADVISORY",
"url": "https://security.archlinux.org/CVE-2022-29911"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5129"
},
{
"type": "ADVISORY",
"url": "https://www.debian.org/security/2022/dsa-5141"
},
{
"type": "ADVISORY",
"url": "https://advisories.mageia.org/CVE-2022-29911.html"
},
{
"type": "ADVISORY",
"url": "https://linux.oracle.com/cve/CVE-2022-29911.html"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1701"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1702"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1703"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1704"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1705"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1724"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1725"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1726"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1727"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:1730"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4589"
},
{
"type": "ADVISORY",
"url": "https://access.redhat.com/errata/RHSA-2022:4590"
},
{
"type": "ADVISORY",
"url": "https://www.suse.com/security/cve/CVE-2022-29911.html"
},
{
"type": "ADVISORY",
"url": "https://ubuntu.com/security/CVE-2022-29911"
}
],
"schema_version": "1.3.0",
"summary": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Firefox ESR \u003c 91.9, Thunderbird \u003c 91.9, and Firefox \u003c 100."
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-29911",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.9"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.9"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "100"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "iframe Sandbox bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-16/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-18/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-17/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-29911"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.9"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "91.9"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "100"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Firefox ESR \u003c 91.9, Thunderbird \u003c 91.9, and Firefox \u003c 100."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "iframe sandbox bypass"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "91.9",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "100.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2022-29911"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-1021"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-17/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-17/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1761981"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-16/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-16/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2022-18/",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2022-18/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7
}
},
"lastModifiedDate": "2023-01-04T16:26Z",
"publishedDate": "2022-12-22T20:15Z"
}
}
}
OPENSUSE-SU-2024:12044-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64 | — |
Vendor Fix
|
| URL | Category |
|---|---|
| https://www.suse.com/support/security/rating/ | external |
| https://ftp.suse.com/pub/projects/security/csaf/o… | self |
| https://www.suse.com/security/cve/CVE-2022-29909/ | self |
| https://www.suse.com/security/cve/CVE-2022-29910/ | self |
| https://www.suse.com/security/cve/CVE-2022-29911/ | self |
| https://www.suse.com/security/cve/CVE-2022-29912/ | self |
| https://www.suse.com/security/cve/CVE-2022-29914/ | self |
| https://www.suse.com/security/cve/CVE-2022-29915/ | self |
| https://www.suse.com/security/cve/CVE-2022-29916/ | self |
| https://www.suse.com/security/cve/CVE-2022-29917/ | self |
| https://www.suse.com/security/cve/CVE-2022-29918/ | self |
| https://www.suse.com/security/cve/CVE-2022-29909 | external |
| https://www.suse.com/security/cve/CVE-2022-29910 | external |
| https://www.suse.com/security/cve/CVE-2022-29911 | external |
| https://www.suse.com/security/cve/CVE-2022-29912 | external |
| https://www.suse.com/security/cve/CVE-2022-29914 | external |
| https://www.suse.com/security/cve/CVE-2022-29915 | external |
| https://www.suse.com/security/cve/CVE-2022-29916 | external |
| https://www.suse.com/security/cve/CVE-2022-29917 | external |
| https://www.suse.com/security/cve/CVE-2022-29918 | external |
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "MozillaFirefox-100.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the MozillaFirefox-100.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-12044",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_12044-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29909 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29909/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29910 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29910/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29911 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29911/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29912 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29912/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29914 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29914/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29915 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29915/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29916 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29916/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29917 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29917/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2022-29918 page",
"url": "https://www.suse.com/security/cve/CVE-2022-29918/"
}
],
"title": "MozillaFirefox-100.0-1.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:12044-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-100.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-100.0-1.1.aarch64",
"product_id": "MozillaFirefox-100.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"product_id": "MozillaFirefox-branding-upstream-100.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-100.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-devel-100.0-1.1.aarch64",
"product_id": "MozillaFirefox-devel-100.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-100.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-common-100.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-common-100.0-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-100.0-1.1.aarch64",
"product": {
"name": "MozillaFirefox-translations-other-100.0-1.1.aarch64",
"product_id": "MozillaFirefox-translations-other-100.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-100.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-100.0-1.1.ppc64le",
"product_id": "MozillaFirefox-100.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"product_id": "MozillaFirefox-branding-upstream-100.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-100.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-devel-100.0-1.1.ppc64le",
"product_id": "MozillaFirefox-devel-100.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-common-100.0-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"product": {
"name": "MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"product_id": "MozillaFirefox-translations-other-100.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-100.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-100.0-1.1.s390x",
"product_id": "MozillaFirefox-100.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"product_id": "MozillaFirefox-branding-upstream-100.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-100.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-devel-100.0-1.1.s390x",
"product_id": "MozillaFirefox-devel-100.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-100.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-common-100.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-common-100.0-1.1.s390x"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-100.0-1.1.s390x",
"product": {
"name": "MozillaFirefox-translations-other-100.0-1.1.s390x",
"product_id": "MozillaFirefox-translations-other-100.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-100.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-100.0-1.1.x86_64",
"product_id": "MozillaFirefox-100.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-100.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-100.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-100.0-1.1.x86_64",
"product_id": "MozillaFirefox-devel-100.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-100.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-100.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-common-100.0-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-100.0-1.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-100.0-1.1.x86_64",
"product_id": "MozillaFirefox-translations-other-100.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-100.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-100.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-100.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-100.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-100.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-100.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-100.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-100.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-100.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-100.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-devel-100.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-100.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-devel-100.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-100.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-devel-100.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-100.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-100.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-100.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-common-100.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-100.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-100.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-common-100.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-100.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-100.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-100.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64"
},
"product_reference": "MozillaFirefox-translations-other-100.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-100.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le"
},
"product_reference": "MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-100.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x"
},
"product_reference": "MozillaFirefox-translations-other-100.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-100.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-100.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-29909",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29909"
}
],
"notes": [
{
"category": "general",
"text": "Documents in deeply-nested cross-origin browsing contexts could have obtained permissions granted to the top-level origin, bypassing the existing prompt and wrongfully inheriting the top-level permissions. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29909",
"url": "https://www.suse.com/security/cve/CVE-2022-29909"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29909"
},
{
"cve": "CVE-2022-29910",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29910"
}
],
"notes": [
{
"category": "general",
"text": "When closed or sent to the background, Firefox for Android would not properly record and persist HSTS settings.\u003cbr\u003e*Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29910",
"url": "https://www.suse.com/security/cve/CVE-2022-29910"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29910"
},
{
"cve": "CVE-2022-29911",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29911"
}
],
"notes": [
{
"category": "general",
"text": "An improper implementation of the new iframe sandbox keyword \u003ccode\u003eallow-top-navigation-by-user-activation\u003c/code\u003e could lead to script execution without \u003ccode\u003eallow-scripts\u003c/code\u003e being present. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29911",
"url": "https://www.suse.com/security/cve/CVE-2022-29911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29911"
},
{
"cve": "CVE-2022-29912",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29912"
}
],
"notes": [
{
"category": "general",
"text": "Requests initiated through reader mode did not properly omit cookies with a SameSite attribute. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29912",
"url": "https://www.suse.com/security/cve/CVE-2022-29912"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29912"
},
{
"cve": "CVE-2022-29914",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29914"
}
],
"notes": [
{
"category": "general",
"text": "When reusing existing popups Firefox would have allowed them to cover the fullscreen notification UI, which could have enabled browser spoofing attacks. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29914",
"url": "https://www.suse.com/security/cve/CVE-2022-29914"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29914"
},
{
"cve": "CVE-2022-29915",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29915"
}
],
"notes": [
{
"category": "general",
"text": "The Performance API did not properly hide the fact whether a request cross-origin resource has observed redirects. This vulnerability affects Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29915",
"url": "https://www.suse.com/security/cve/CVE-2022-29915"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29915"
},
{
"cve": "CVE-2022-29916",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29916"
}
],
"notes": [
{
"category": "general",
"text": "Firefox behaved slightly differently for already known resources when loading CSS resources involving CSS variables. This could have been used to probe the browser history. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29916",
"url": "https://www.suse.com/security/cve/CVE-2022-29916"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29916"
},
{
"cve": "CVE-2022-29917",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29917"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers Andrew McCreight, Gabriele Svelto, Tom Ritter and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99 and Firefox ESR 91.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.9, Firefox ESR \u003c 91.9, and Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29917",
"url": "https://www.suse.com/security/cve/CVE-2022-29917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29917"
},
{
"cve": "CVE-2022-29918",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2022-29918"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers Gabriele Svelto, Randell Jesup and the Mozilla Fuzzing Team reported memory safety bugs present in Firefox 99. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 100.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2022-29918",
"url": "https://www.suse.com/security/cve/CVE-2022-29918"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-branding-upstream-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-devel-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-common-100.0-1.1.x86_64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.aarch64",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.ppc64le",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.s390x",
"openSUSE Tumbleweed:MozillaFirefox-translations-other-100.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2022-29918"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.