<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0681-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-03-15T04:46:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-03-15T04:46:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-03-15T04:46:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for Mozilla Firefox to version 52.7.0esr fixes multiple issues.

Security issues fixed (bsc#1085130, MFSA 2018-07):

- CVE-2018-5127: Buffer overflow manipulating SVG animatedPathSegList
- CVE-2018-5129: Out-of-bounds write with malformed IPC messages
- CVE-2018-5130: Mismatched RTP payload type can trigger memory corruption
- CVE-2018-5131: Fetch API improperly returns cached copies of no-store/no-cache resources
- CVE-2018-5144: Integer overflow during Unicode conversion
- CVE-2018-5125: Memory safety bugs fixed in Firefox 59 and Firefox ESR 52.7
- CVE-2018-5145: Memory safety bugs fixed in Firefox ESR 52.7

The following bug fixes are included:

- bsc#1076907: provide mimehandler(text/html)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0681-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-52.7-78.1">MozillaFirefox-52.7-78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-52.7-78.1">MozillaFirefox-branding-upstream-52.7-78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-52.7-78.1">MozillaFirefox-buildsymbols-52.7-78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-devel-52.7-78.1">MozillaFirefox-devel-52.7-78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-52.7-78.1">MozillaFirefox-translations-common-52.7-78.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-52.7-78.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-52.7-78.1">MozillaFirefox-translations-other-52.7-78.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-52.7-78.1">MozillaFirefox-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1">MozillaFirefox-branding-upstream-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1">MozillaFirefox-buildsymbols-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1">MozillaFirefox-devel-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1">MozillaFirefox-translations-common-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-52.7-78.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1">MozillaFirefox-translations-other-52.7-78.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 58 and Firefox ESR 52.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5125</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5125.html</URL>
        <Description>CVE-2018-5125</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur when manipulating the SVG "animatedPathSegList" through script. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5127</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5127.html</URL>
        <Description>CVE-2018-5127</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A lack of parameter validation on IPC messages results in a potential out-of-bounds write through malformed IPC messages. This can potentially allow for sandbox escape through memory corruption in the parent process. This vulnerability affects Thunderbird &lt; 52.7, Firefox ESR &lt; 52.7, and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5129</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5129.html</URL>
        <Description>CVE-2018-5129</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When packets with a mismatched RTP payload type are sent in WebRTC connections, in some circumstances a potentially exploitable crash is triggered. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5130</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5130.html</URL>
        <Description>CVE-2018-5130</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Under certain circumstances the "fetch()" API can return transient local copies of resources that were sent with a "no-store" or "no-cache" cache header instead of downloading a copy from the network as it should. This can result in previously stored, locally cached data of a website being accessible to users if they share a common profile while browsing. This vulnerability affects Firefox ESR &lt; 52.7 and Firefox &lt; 59.</Note>
    </Notes>
    <CVE>CVE-2018-5131</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5131.html</URL>
        <Description>CVE-2018-5131</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur during conversion of text to some Unicode character sets due to an unchecked length parameter. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.</Note>
    </Notes>
    <CVE>CVE-2018-5144</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5144.html</URL>
        <Description>CVE-2018-5144</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox ESR 52.6. These bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 52.7 and Thunderbird &lt; 52.7.</Note>
    </Notes>
    <CVE>CVE-2018-5145</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-52.7-78.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-52.7-78.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2018-03/msg00037.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5145.html</URL>
        <Description>CVE-2018-5145</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1085130</URL>
        <Description>SUSE Bug 1085130</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
