<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:3435-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-25T08:00:57Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-25T08:00:57Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-25T08:00:57Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for Mozilla Firefox to version 60.3.0esr fixes security issues and stability bugs.

The following security issues were fixed (MFSA 2018-27, boo#1112852):

- CVE-2018-12392: Crash with nested event loops
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts
- CVE-2018-12397: WebExtension local file access vulnerability
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:3435-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-60.3.0-122.2">MozillaFirefox-60.3.0-122.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-60.3.0-122.2">MozillaFirefox-branding-upstream-60.3.0-122.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-60.3.0-122.2">MozillaFirefox-buildsymbols-60.3.0-122.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-devel-60.3.0-122.2">MozillaFirefox-devel-60.3.0-122.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.3.0-122.2">MozillaFirefox-translations-common-60.3.0-122.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-60.3.0-122.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-60.3.0-122.2">MozillaFirefox-translations-other-60.3.0-122.2</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2">MozillaFirefox-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2">MozillaFirefox-branding-upstream-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2">MozillaFirefox-buildsymbols-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2">MozillaFirefox-devel-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2">MozillaFirefox-translations-common-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-60.3.0-122.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2">MozillaFirefox-translations-other-60.3.0-122.2 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12389.html</URL>
        <Description>CVE-2018-12389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12390.html</URL>
        <Description>CVE-2018-12390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12392.html</URL>
        <Description>CVE-2018-12392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12393.html</URL>
        <Description>CVE-2018-12393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12395</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12395.html</URL>
        <Description>CVE-2018-12395</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12396</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12396.html</URL>
        <Description>CVE-2018-12396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.3.0-122.2</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.3.0-122.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00063.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12397.html</URL>
        <Description>CVE-2018-12397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
