<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Thunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:1579-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-06-16T09:03:31Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-06-16T09:03:31Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-06-16T09:03:31Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Thunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Thunderbird 52.2 fixes security issues and bugs.

The following vulnerabilities were fixed:
    
* CVE-2017-5472: Use-after-free using destroyed node when regenerating trees
* CVE-2017-7749: Use-after-free during docshell reloading
* CVE-2017-7750: Use-after-free with track elements
* CVE-2017-7751: Use-after-free with content viewer listeners
* CVE-2017-7752: Use-after-free with IME input
* CVE-2017-7754: Out-of-bounds read in WebGL with ImageInfo object
* CVE-2017-7756: Use-after-free and use-after-scope logging XHR header errors
* CVE-2017-7757: Use-after-free in IndexedDB
* CVE-2017-7778, CVE-2017-7778, CVE-2017-7771, CVE-2017-7772,
  CVE-2017-7773, CVE-2017-7774, CVE-2017-7775, CVE-2017-7776,
  CVE-2017-7777: Vulnerabilities in the Graphite 2 library
* CVE-2017-7758: Out-of-bounds read in Opus encoder
* CVE-2017-7764: Domain spoofing with combination of Canadian Syllabics and other unicode blocks
* CVE-2017-5470: Memory safety bugs fixed in Firefox 54 and Firefox ESR 52.2

Mozilla Thunderbird now requires NSS 3.28.5.

The following bugs were fixed:

* Embedded images not shown in email received from Hotmail/Outlook webmailer
* Detection of non-ASCII font names in font selector
* Attachment not forwarded correctly under certain circumstances
* Multiple requests for master password when GMail OAuth2 is enabled
* Large number of blank pages being printed under certain circumstances when invalid preferences were present
* Messages sent via the Simple MAPI interface are forced to HTML
* Calendar: Invitations can't be printed
* Mailing list (group) not accessible from macOS or Outlook address book
* Clicking on links with references/anchors where target doesn't exist in the message not opening in external browser
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2017-694</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1040105</URL>
      <Description>SUSE Bug 1040105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1042090</URL>
      <Description>SUSE Bug 1042090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1043960</URL>
      <Description>SUSE Bug 1043960</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1273265</URL>
      <Description>SUSE Bug 1273265</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1355039</URL>
      <Description>SUSE Bug 1355039</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1356558</URL>
      <Description>SUSE Bug 1356558</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1356824</URL>
      <Description>SUSE Bug 1356824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1357090</URL>
      <Description>SUSE Bug 1357090</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1359547</URL>
      <Description>SUSE Bug 1359547</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1360309</URL>
      <Description>SUSE Bug 1360309</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1363396</URL>
      <Description>SUSE Bug 1363396</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1364283</URL>
      <Description>SUSE Bug 1364283</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1365602</URL>
      <Description>SUSE Bug 1365602</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1366595</URL>
      <Description>SUSE Bug 1366595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1368490</URL>
      <Description>SUSE Bug 1368490</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5470/</URL>
      <Description>SUSE CVE CVE-2017-5470 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5472/</URL>
      <Description>SUSE CVE CVE-2017-5472 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7749/</URL>
      <Description>SUSE CVE CVE-2017-7749 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7750/</URL>
      <Description>SUSE CVE CVE-2017-7750 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7751/</URL>
      <Description>SUSE CVE CVE-2017-7751 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7752/</URL>
      <Description>SUSE CVE CVE-2017-7752 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7754/</URL>
      <Description>SUSE CVE CVE-2017-7754 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7756/</URL>
      <Description>SUSE CVE CVE-2017-7756 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7757/</URL>
      <Description>SUSE CVE CVE-2017-7757 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7758/</URL>
      <Description>SUSE CVE CVE-2017-7758 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7763/</URL>
      <Description>SUSE CVE CVE-2017-7763 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7764/</URL>
      <Description>SUSE CVE CVE-2017-7764 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7765/</URL>
      <Description>SUSE CVE CVE-2017-7765 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7771/</URL>
      <Description>SUSE CVE CVE-2017-7771 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7772/</URL>
      <Description>SUSE CVE CVE-2017-7772 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7773/</URL>
      <Description>SUSE CVE CVE-2017-7773 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7774/</URL>
      <Description>SUSE CVE CVE-2017-7774 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7775/</URL>
      <Description>SUSE CVE CVE-2017-7775 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7776/</URL>
      <Description>SUSE CVE CVE-2017-7776 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7777/</URL>
      <Description>SUSE CVE CVE-2017-7777 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-7778/</URL>
      <Description>SUSE CVE CVE-2017-7778 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-52.2-36.1">
      <FullProductName ProductID="MozillaThunderbird-52.2-36.1">MozillaThunderbird-52.2-36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-52.2-36.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-52.2-36.1">MozillaThunderbird-buildsymbols-52.2-36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-52.2-36.1">
      <FullProductName ProductID="MozillaThunderbird-devel-52.2-36.1">MozillaThunderbird-devel-52.2-36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-52.2-36.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-52.2-36.1">MozillaThunderbird-translations-common-52.2-36.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-52.2-36.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-52.2-36.1">MozillaThunderbird-translations-other-52.2-36.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-52.2-36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-52.2-36.1">MozillaThunderbird-52.2-36.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-52.2-36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1">MozillaThunderbird-buildsymbols-52.2-36.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-52.2-36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1">MozillaThunderbird-devel-52.2-36.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-52.2-36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1">MozillaThunderbird-translations-common-52.2-36.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-52.2-36.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1">MozillaThunderbird-translations-other-52.2-36.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 53 and Firefox ESR 52.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-5470</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5470.html</URL>
        <Description>CVE-2017-5470</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability with the frameloader during tree reconstruction while regenerating CSS layout when attempting to use a node in the tree that no longer exists. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-5472</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5472.html</URL>
        <Description>CVE-2017-5472</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability when using an incorrect URL during the reloading of a docshell. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7749</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7749.html</URL>
        <Description>CVE-2017-7749</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability during video control operations when a "&lt;track&gt;" element holds a reference to an older window if that window has been replaced in the DOM. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7750</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7750.html</URL>
        <Description>CVE-2017-7750</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability with content viewer listeners that results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7751</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7751.html</URL>
        <Description>CVE-2017-7751</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability during specific user interactions with the input method editor (IME) in some languages due to how events are handled. This results in a potentially exploitable crash but would require specific user interaction to trigger. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7752</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7752.html</URL>
        <Description>CVE-2017-7752</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read in WebGL with a maliciously crafted "ImageInfo" object during WebGL operations. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7754</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7754.html</URL>
        <Description>CVE-2017-7754</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free and use-after-scope vulnerability when logging errors from headers for XML HTTP Requests (XHR). This could result in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7756</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7756.html</URL>
        <Description>CVE-2017-7756</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in IndexedDB when one of its objects is destroyed in memory while a method on it is still being executed. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7757.html</URL>
        <Description>CVE-2017-7757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An out-of-bounds read vulnerability with the Opus encoder when the number of channels in an audio stream changes while the encoder is in use. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7758</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7758.html</URL>
        <Description>CVE-2017-7758</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Default fonts on OS X display some Tibetan characters as whitespace. When used in the addressbar as part of an IDN this can be used for domain name spoofing attacks. Note: This attack only affects OS X operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7763</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7763.html</URL>
        <Description>CVE-2017-7763</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Characters from the "Canadian Syllabics" unicode block can be mixed with characters from other unicode blocks in the addressbar instead of being rendered as their raw "punycode" form, allowing for domain name spoofing attacks through character confusion. The current Unicode standard allows characters from "Aspirational Use Scripts" such as Canadian Syllabics to be mixed with Latin characters in the "moderately restrictive" IDN profile. We have changed Firefox behavior to match the upcoming Unicode version 10.0 which removes this category and treats them as "Limited Use Scripts.". This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7764</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7764.html</URL>
        <Description>CVE-2017-7764</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The "Mark of the Web" was not correctly saved on Windows when files with very long names were downloaded from the Internet. Without the Mark of the Web data, the security warning that Windows displays before running executables downloaded from the Internet is not shown. Note: This attack only affects Windows operating systems. Other operating systems are unaffected. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7765</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7765.html</URL>
        <Description>CVE-2017-7765</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Pass::readPass function.</Note>
    </Notes>
    <CVE>CVE-2017-7771</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7771.html</URL>
        <Description>CVE-2017-7771</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow in Graphite2 library in Firefox before 54 in lz4::decompress function.</Note>
    </Notes>
    <CVE>CVE-2017-7772</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7772.html</URL>
        <Description>CVE-2017-7772</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow write in Graphite2 library in Firefox before 54 in lz4::decompress src/Decompressor.</Note>
    </Notes>
    <CVE>CVE-2017-7773</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7773.html</URL>
        <Description>CVE-2017-7773</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Silf::readGraphite function.</Note>
    </Notes>
    <CVE>CVE-2017-7774</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7774.html</URL>
        <Description>CVE-2017-7774</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.</Note>
    </Notes>
    <CVE>CVE-2017-7775</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7775.html</URL>
        <Description>CVE-2017-7775</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based Buffer Overflow read in Graphite2 library in Firefox before 54 in graphite2::Silf::getClassGlyph.</Note>
    </Notes>
    <CVE>CVE-2017-7776</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7776.html</URL>
        <Description>CVE-2017-7776</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use of uninitialized memory in Graphite2 library in Firefox before 54 in graphite2::GlyphCache::Loader::read_glyph function.</Note>
    </Notes>
    <CVE>CVE-2017-7777</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7777.html</URL>
        <Description>CVE-2017-7777</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox &lt; 54, Firefox ESR &lt; 52.2, and Thunderbird &lt; 52.2.</Note>
    </Notes>
    <CVE>CVE-2017-7778</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.2-36.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.2-36.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-7778.html</URL>
        <Description>CVE-2017-7778</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1043960</URL>
        <Description>SUSE Bug 1043960</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044239</URL>
        <Description>SUSE Bug 1044239</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044240</URL>
        <Description>SUSE Bug 1044240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044241</URL>
        <Description>SUSE Bug 1044241</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1044242</URL>
        <Description>SUSE Bug 1044242</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
