Login
Newsletter
Werbung

Sicherheit: Mehrere Probleme in MozillaFirefox
Aktuelle Meldungen Distributionen
Name: Mehrere Probleme in MozillaFirefox
ID: SUSE-SU-2024:1770-1
Distribution: SUSE
Plattformen: SUSE Enterprise Storage 7.1, SUSE Linux Enterprise High Performance Computing 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP4, SUSE Linux Enterprise Server 15 SP2, SUSE Linux Enterprise Server 15 SP4, SUSE Linux Enterprise Server 15 SP3, SUSE Linux Enterprise Server for SAP Applications 15 SP2, SUSE Linux Enterprise Server for SAP Applications 15 SP4, SUSE Linux Enterprise Server for SAP Applications 15 SP3, SUSE Linux Enterprise High Performance Computing LTSS 15 SP3, SUSE Linux Enterprise High Performance Computing 15 SP2, SUSE Linux Enterprise Real Time 15 SP5, SUSE Linux Enterprise Server for SAP Applications 15 SP5, SUSE Linux Enterprise Server 15 SP5, SUSE Linux Enterprise High Performance Computing 15 SP5, SUSE Linux Enterprise Desktop 15 SP5, SUSE Desktop Applications Module 15-SP5, SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3, SUSE openSUSE Leap 15.5, SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2, SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise High Performance Computing LTSS 15 SP4, SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4, SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4, SUSE Linux Enterprise Desktop 15 SP6, SUSE Linux Enterprise Server for SAP Applications 15 SP6, SUSE Linux Enterprise Server 15 SP6, SUSE Linux Enterprise Real Time 15 SP6, SUSE openSUSE Leap 15.6, SUSE Desktop Applications Module 15-SP6
Datum: Do, 23. Mai 2024, 21:56
Referenzen: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3854
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3864
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4769
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4367
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4767
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3302
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4770
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3852
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-2609
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4768
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3863
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3859
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-4777
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3861
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3857
Applikationen: Mozilla Firefox

Originalnachricht

--===============8394215507152112754==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit



# Security update for MozillaFirefox

Announcement ID: SUSE-SU-2024:1770-1
Rating: important
References:

* bsc#1222535
* bsc#1224056


Cross-References:

* CVE-2024-2609
* CVE-2024-3302
* CVE-2024-3852
* CVE-2024-3854
* CVE-2024-3857
* CVE-2024-3859
* CVE-2024-3861
* CVE-2024-3863
* CVE-2024-3864
* CVE-2024-4367
* CVE-2024-4767
* CVE-2024-4768
* CVE-2024-4769
* CVE-2024-4770
* CVE-2024-4777


CVSS scores:

* CVE-2024-2609 ( SUSE ): 5.9 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N
* CVE-2024-3302 ( SUSE ): 3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
* CVE-2024-3852 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3854 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3857 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-3859 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-3861 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-3863 ( SUSE ): 5.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
* CVE-2024-3864 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4367 ( SUSE ): 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4767 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4768 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4769 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
* CVE-2024-4770 ( SUSE ): 8.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
* CVE-2024-4777 ( SUSE ): 6.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N


Affected Products:

* Desktop Applications Module 15-SP5
* Desktop Applications Module 15-SP6
* openSUSE Leap 15.5
* openSUSE Leap 15.6
* SUSE Enterprise Storage 7.1
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Desktop 15 SP5
* SUSE Linux Enterprise Desktop 15 SP6
* SUSE Linux Enterprise High Performance Computing 15 SP2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise High Performance Computing 15 SP3
* SUSE Linux Enterprise High Performance Computing 15 SP4
* SUSE Linux Enterprise High Performance Computing 15 SP5
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
* SUSE Linux Enterprise Real Time 15 SP5
* SUSE Linux Enterprise Real Time 15 SP6
* SUSE Linux Enterprise Server 15 SP2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
* SUSE Linux Enterprise Server 15 SP3
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
* SUSE Linux Enterprise Server 15 SP4
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
* SUSE Linux Enterprise Server 15 SP5
* SUSE Linux Enterprise Server 15 SP6
* SUSE Linux Enterprise Server for SAP Applications 15 SP2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3
* SUSE Linux Enterprise Server for SAP Applications 15 SP4
* SUSE Linux Enterprise Server for SAP Applications 15 SP5
* SUSE Linux Enterprise Server for SAP Applications 15 SP6



An update that solves 15 vulnerabilities can now be installed.

## Description:

This update for MozillaFirefox fixes the following issues:

Update to version 115.11.0 ESR (bsc#1224056):

* CVE-2024-4367: Arbitrary JavaScript execution in PDF.js
* CVE-2024-4767: IndexedDB files retained in private browsing mode
* CVE-2024-4768: Potential permissions request bypass via clickjacking
* CVE-2024-4769: Cross-origin responses could be distinguished between script
and non-script Content-Types
* CVE-2024-4770: Use-after-free could occur when printing to PDF
* CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR 115.11,
and Thunderbird 115.11

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

* openSUSE Leap 15.5
zypper in -t patch openSUSE-SLE-15.5-2024-1770=1

* openSUSE Leap 15.6
zypper in -t patch openSUSE-SLE-15.6-2024-1770=1

* Desktop Applications Module 15-SP5
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1770=1

* Desktop Applications Module 15-SP6
zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1770=1

* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1770=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3
zypper in -t patch SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1770=1

* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1770=1

* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4
zypper in -t patch SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1770=1

* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1770=1

* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2
zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1770=1

* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3
zypper in -t patch SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1770=1

* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4
zypper in -t patch SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1770=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP2
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1770=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP3
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1770=1

* SUSE Linux Enterprise Server for SAP Applications 15 SP4
zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1770=1

* SUSE Enterprise Storage 7.1
zypper in -t patch SUSE-Storage-7.1-2024-1770=1

## Package List:

* openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-branding-upstream-115.11.0-150200.152.137.2
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* openSUSE Leap 15.5 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-branding-upstream-115.11.0-150200.152.137.2
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* openSUSE Leap 15.6 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* Desktop Applications Module 15-SP5 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* Desktop Applications Module 15-SP6 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(aarch64
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS 15-SP2
(noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (aarch64
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP3 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (aarch64
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise High Performance Computing LTSS 15 SP4 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64 ppc64le s390x
x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (ppc64le x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP2 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (ppc64le x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP3 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (ppc64le x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Linux Enterprise Server for SAP Applications 15 SP4 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2
* SUSE Enterprise Storage 7.1 (aarch64 x86_64)
* MozillaFirefox-translations-other-115.11.0-150200.152.137.2
* MozillaFirefox-115.11.0-150200.152.137.2
* MozillaFirefox-debuginfo-115.11.0-150200.152.137.2
* MozillaFirefox-translations-common-115.11.0-150200.152.137.2
* MozillaFirefox-debugsource-115.11.0-150200.152.137.2
* SUSE Enterprise Storage 7.1 (noarch)
* MozillaFirefox-devel-115.11.0-150200.152.137.2

## References:

* https://www.suse.com/security/cve/CVE-2024-2609.html
* https://www.suse.com/security/cve/CVE-2024-3302.html
* https://www.suse.com/security/cve/CVE-2024-3852.html
* https://www.suse.com/security/cve/CVE-2024-3854.html
* https://www.suse.com/security/cve/CVE-2024-3857.html
* https://www.suse.com/security/cve/CVE-2024-3859.html
* https://www.suse.com/security/cve/CVE-2024-3861.html
* https://www.suse.com/security/cve/CVE-2024-3863.html
* https://www.suse.com/security/cve/CVE-2024-3864.html
* https://www.suse.com/security/cve/CVE-2024-4367.html
* https://www.suse.com/security/cve/CVE-2024-4767.html
* https://www.suse.com/security/cve/CVE-2024-4768.html
* https://www.suse.com/security/cve/CVE-2024-4769.html
* https://www.suse.com/security/cve/CVE-2024-4770.html
* https://www.suse.com/security/cve/CVE-2024-4777.html
* https://bugzilla.suse.com/show_bug.cgi?id=1222535
* https://bugzilla.suse.com/show_bug.cgi?id=1224056


--===============8394215507152112754==
Content-Type: text/html; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit




<div class="container">
<h1>Security update for MozillaFirefox</h1>

<table class="table table-striped table-bordered">
<tbody>
<tr>
<th>Announcement ID:</th>
<td>SUSE-SU-2024:1770-1</td>
</tr>

<tr>
<th>Rating:</th>
<td>important</td>
</tr>
<tr>
<th>References:</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222535">bsc#1222535</a>
</li>

<li style="display: inline;">
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224056">bsc#1224056</a>
</li>


</ul>
</td>
</tr>

<tr>
<th>
Cross-References:
</th>
<td>
<ul>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-2609.html">CVE-2024-2609</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3302.html">CVE-2024-3302</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3852.html">CVE-2024-3852</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3854.html">CVE-2024-3854</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3857.html">CVE-2024-3857</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3859.html">CVE-2024-3859</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3861.html">CVE-2024-3861</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3863.html">CVE-2024-3863</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-3864.html">CVE-2024-3864</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4367.html">CVE-2024-4367</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4767.html">CVE-2024-4767</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4768.html">CVE-2024-4768</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4769.html">CVE-2024-4769</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4770.html">CVE-2024-4770</a>
</li>

<li style="display: inline;">
<a href="https://www.suse.com/security/cve/CVE-2024-4777.html">CVE-2024-4777</a>
</li>

</ul>
</td>
</tr>
<tr>
<th>CVSS scores:</th>
<td>
<ul class="list-group">

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-2609</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.9</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3302</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">3.7</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3852</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3854</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3857</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3859</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3861</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3863</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">5.0</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-3864</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4367</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">7.5</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4767</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4768</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4769</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4770</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">8.8</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H</span>
</li>

<li class="list-group-item">
<span
class="cvss-reference">CVE-2024-4777</span>
<span class="cvss-source">
(

SUSE

):
</span>
<span
class="cvss-score">6.1</span>
<span
class="cvss-vector">CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N</span>
</li>

</ul>
</td>
</tr>

<tr>
<th>Affected Products:</th>
<td>
<ul class="list-group">

<li class="list-group-item">Desktop
Applications Module 15-SP5</li>

<li class="list-group-item">Desktop
Applications Module 15-SP6</li>

<li class="list-group-item">openSUSE Leap
15.5</li>

<li class="list-group-item">openSUSE Leap
15.6</li>

<li class="list-group-item">SUSE
Enterprise Storage 7.1</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Desktop 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing ESPOS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise High Performance Computing LTSS 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Real Time 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP2 LTSS 15-SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP3 LTSS 15-SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP4 LTSS 15-SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server 15 SP6</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP2</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP3</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP4</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP5</li>

<li class="list-group-item">SUSE Linux
Enterprise Server for SAP Applications 15 SP6</li>

</ul>
</td>
</tr>
</tbody>
</table>

<p>An update that solves 15 vulnerabilities can now be
installed.</p>





<h2>Description:</h2>

<p>This update for MozillaFirefox fixes the following
issues:</p>
<p>Update to version 115.11.0 ESR (bsc#1224056):</p>
<ul>
<li>CVE-2024-4367: Arbitrary JavaScript execution in PDF.js</li>
<li>CVE-2024-4767: IndexedDB files retained in private browsing
mode</li>
<li>CVE-2024-4768: Potential permissions request bypass via
clickjacking</li>
<li>CVE-2024-4769: Cross-origin responses could be distinguished between
script and non-script Content-Types</li>
<li>CVE-2024-4770: Use-after-free could occur when printing to
PDF</li>
<li>CVE-2024-4777: Memory safety bugs fixed in Firefox 126, Firefox ESR
115.11, and Thunderbird 115.11</li>
</ul>





<h2>Patch Instructions:</h2>
<p>
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper
patch".<br/>

Alternatively you can run the command listed for your product:
</p>
<ul class="list-group">

<li class="list-group-item">
openSUSE Leap 15.5


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.5-2024-1770=1</code>



</li>

<li class="list-group-item">
openSUSE Leap 15.6


<br/>
<code>zypper in -t patch
openSUSE-SLE-15.6-2024-1770=1</code>



</li>

<li class="list-group-item">
Desktop Applications Module 15-SP5


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Desktop-Applications-15-SP5-2024-1770=1</code>



</li>

<li class="list-group-item">
Desktop Applications Module 15-SP6


<br/>
<code>zypper in -t patch
SUSE-SLE-Module-Desktop-Applications-15-SP6-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing 15 SP2 LTSS
15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP2-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP3-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing ESPOS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise High Performance Computing LTSS 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP2-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP3-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP2


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP2-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP3


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP3-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Linux Enterprise Server for SAP Applications 15 SP4


<br/>
<code>zypper in -t patch
SUSE-SLE-Product-SLES_SAP-15-SP4-2024-1770=1</code>



</li>

<li class="list-group-item">
SUSE Enterprise Storage 7.1


<br/>
<code>zypper in -t patch
SUSE-Storage-7.1-2024-1770=1</code>



</li>

</ul>

<h2>Package List:</h2>
<ul>


<li>
openSUSE Leap 15.5 (aarch64 ppc64le s390x x86_64)
<ul>


<li>MozillaFirefox-branding-upstream-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
openSUSE Leap 15.5 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
openSUSE Leap 15.6 (aarch64 ppc64le s390x x86_64)
<ul>


<li>MozillaFirefox-branding-upstream-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
openSUSE Leap 15.6 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
Desktop Applications Module 15-SP5 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
Desktop Applications Module 15-SP5 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
Desktop Applications Module 15-SP6 (aarch64 ppc64le s390x
x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
Desktop Applications Module 15-SP6 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (aarch64 x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing 15 SP2
LTSS 15-SP2 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP3 (aarch64 x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP3 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (aarch64 x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing ESPOS 15
SP4 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (aarch64 x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise High Performance Computing LTSS 15
SP4 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Desktop 15 SP4 LTSS 15-SP4 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (aarch64
ppc64le s390x x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP2 LTSS 15-SP2 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (aarch64
ppc64le s390x x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP3 LTSS 15-SP3 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (aarch64
ppc64le s390x x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server 15 SP4 LTSS 15-SP4 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(ppc64le x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP2
(noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3
(ppc64le x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP3
(noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(ppc64le x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Linux Enterprise Server for SAP Applications 15 SP4
(noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>



<li>
SUSE Enterprise Storage 7.1 (aarch64 x86_64)
<ul>


<li>MozillaFirefox-translations-other-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debuginfo-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-translations-common-115.11.0-150200.152.137.2</li>


<li>MozillaFirefox-debugsource-115.11.0-150200.152.137.2</li>

</ul>
</li>

<li>
SUSE Enterprise Storage 7.1 (noarch)
<ul>


<li>MozillaFirefox-devel-115.11.0-150200.152.137.2</li>

</ul>
</li>


</ul>


<h2>References:</h2>
<ul>


<li>
<a href="https://www.suse.com/security/cve/CVE-2024-2609.html">https://www.suse.com/security/cve/CVE-2024-2609.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3302.html">https://www.suse.com/security/cve/CVE-2024-3302.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3852.html">https://www.suse.com/security/cve/CVE-2024-3852.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3854.html">https://www.suse.com/security/cve/CVE-2024-3854.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3857.html">https://www.suse.com/security/cve/CVE-2024-3857.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3859.html">https://www.suse.com/security/cve/CVE-2024-3859.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3861.html">https://www.suse.com/security/cve/CVE-2024-3861.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3863.html">https://www.suse.com/security/cve/CVE-2024-3863.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-3864.html">https://www.suse.com/security/cve/CVE-2024-3864.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4367.html">https://www.suse.com/security/cve/CVE-2024-4367.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4767.html">https://www.suse.com/security/cve/CVE-2024-4767.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4768.html">https://www.suse.com/security/cve/CVE-2024-4768.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4769.html">https://www.suse.com/security/cve/CVE-2024-4769.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4770.html">https://www.suse.com/security/cve/CVE-2024-4770.html</a>
</li>



<li>
<a href="https://www.suse.com/security/cve/CVE-2024-4777.html">https://www.suse.com/security/cve/CVE-2024-4777.html</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1222535">https://bugzilla.suse.com/show_bug.cgi?id=1222535</a>
</li>



<li>
<a href="https://bugzilla.suse.com/show_bug.cgi?id=1224056">https://bugzilla.suse.com/show_bug.cgi?id=1224056</a>
</li>


</ul>

</div>

--===============8394215507152112754==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung