{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"Critical"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"firefox security update",
				"category":"general",
				"title":"Synopsis"
			},
			{
				"text":"An update for firefox is now available for openEuler-22.03-LTS-SP3",
				"category":"general",
				"title":"Summary"
			},
			{
				"text":"Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.\n\nSecurity Fix(es):\n\nMemory safety  bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113.\n\n(CVE-2023-32216)\n\nIncreasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().\n\n(CVE-2023-6879)",
				"category":"general",
				"title":"Description"
			},
			{
				"text":"An update for firefox is now available for openEuler-20.03-LTS-SP4/openEuler-22.03-LTS-SP3.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
				"category":"general",
				"title":"Topic"
			},
			{
				"text":"Critical",
				"category":"general",
				"title":"Severity"
			},
			{
				"text":"firefox",
				"category":"general",
				"title":"Affected Component"
			}
		],
		"publisher":{
			"issuing_authority":"openEuler security committee",
			"name":"openEuler",
			"namespace":"https://www.openeuler.org",
			"contact_details":"openeuler-security@openeuler.org",
			"category":"vendor"
		},
		"references":[
			{
				"summary":"openEuler-SA-2025-1379",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1379"
			},
			{
				"summary":"CVE-2023-32216",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-32216&packageName=firefox"
			},
			{
				"summary":"CVE-2023-6879",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2023-6879&packageName=firefox"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-32216"
			},
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-6879"
			},
			{
				"summary":"openEuler-SA-2025-1379 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/advisories/2025/csaf-openeuler-sa-2025-1379.json"
			}
		],
		"title":"An update for firefox is now available for openEuler-22.03-LTS-SP3",
		"tracking":{
			"initial_release_date":"2025-04-03T20:56:39+08:00",
			"revision_history":[
				{
					"date":"2025-04-03T20:56:39+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2025-04-03T20:56:39+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2025-04-03T20:56:39+08:00",
			"id":"openEuler-SA-2025-1379",
			"version":"1.0.0",
			"status":"final"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"openEuler-22.03-LTS-SP3",
									"name":"openEuler-22.03-LTS-SP3"
								},
								"name":"openEuler-22.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"aarch64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-128.8.0-1.oe2203sp3.aarch64.rpm",
									"name":"firefox-128.8.0-1.oe2203sp3.aarch64.rpm"
								},
								"name":"firefox-128.8.0-1.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64.rpm",
									"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64.rpm"
								},
								"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-debugsource-128.8.0-1.oe2203sp3.aarch64.rpm",
									"name":"firefox-debugsource-128.8.0-1.oe2203sp3.aarch64.rpm"
								},
								"name":"firefox-debugsource-128.8.0-1.oe2203sp3.aarch64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-128.8.0-1.oe2203sp3.src.rpm",
									"name":"firefox-128.8.0-1.oe2203sp3.src.rpm"
								},
								"name":"firefox-128.8.0-1.oe2203sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"x86_64",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-128.8.0-1.oe2203sp3.x86_64.rpm",
									"name":"firefox-128.8.0-1.oe2203sp3.x86_64.rpm"
								},
								"name":"firefox-128.8.0-1.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64.rpm",
									"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64.rpm"
								},
								"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:22.03-LTS-SP3"
									},
									"product_id":"firefox-debugsource-128.8.0-1.oe2203sp3.x86_64.rpm",
									"name":"firefox-debugsource-128.8.0-1.oe2203sp3.x86_64.rpm"
								},
								"name":"firefox-debugsource-128.8.0-1.oe2203sp3.x86_64.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-128.8.0-1.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
					"name":"firefox-128.8.0-1.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
					"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-debugsource-128.8.0-1.oe2203sp3.aarch64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
					"name":"firefox-debugsource-128.8.0-1.oe2203sp3.aarch64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-128.8.0-1.oe2203sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
					"name":"firefox-128.8.0-1.oe2203sp3.src as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-128.8.0-1.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
					"name":"firefox-128.8.0-1.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
					"name":"firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-22.03-LTS-SP3",
				"product_reference":"firefox-debugsource-128.8.0-1.oe2203sp3.x86_64.rpm",
				"full_product_name":{
					"product_id":"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64",
					"name":"firefox-debugsource-128.8.0-1.oe2203sp3.x86_64 as a component of openEuler-22.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2023-32216",
			"notes":[
				{
					"text":"Memory safety  bugs present in Firefox 112. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113.\n\n",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1379"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2023-32216"
		},
		{
			"cve":"CVE-2023-6879",
			"notes":[
				{
					"text":"Increasing the resolution of video frames, while performing a multi-threaded encode, can result in a heap overflow in av1_loop_restoration_dealloc().\n\n",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
					"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
					"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
				]
			},
			"remediations":[
				{
					"product_ids":[
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
					],
					"details":"firefox security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2025-1379"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"CRITICAL",
						"baseScore":9.8,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
						"version":"3.1"
					},
					"products":[
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.aarch64",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.src",
						"openEuler-22.03-LTS-SP3:firefox-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debuginfo-128.8.0-1.oe2203sp3.x86_64",
						"openEuler-22.03-LTS-SP3:firefox-debugsource-128.8.0-1.oe2203sp3.x86_64"
					]
				}
			],
			"threats":[
				{
					"details":"Critical",
					"category":"impact"
				}
			],
			"title":"CVE-2023-6879"
		}
	]
}