<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:4112-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-13T07:35:45Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-13T07:35:45Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-13T07:35:45Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Firefox 60.4.0 ESR fixes security issues and bugs.

Security issues fixed as part of the MFSA 2018-30 advisory (boo#1119105):

- CVE-2018-17466: Buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Use-after-free with select element
- CVE-2018-18493: Buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Same-origin policy violation using location attribute and performance.getEntries to steal cross-origin URLs
- CVE-2018-18498: Integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Memory safety bugs fixed in Firefox 64 and Firefox ESR 60.4

The following changes are included:

- now requires NSS &amp;gt;= 3.36.6
- Updated list of currency codes to include Unidad Previsional (UYW)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:4112-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-60.4.0-125.1">MozillaFirefox-60.4.0-125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-60.4.0-125.1">MozillaFirefox-branding-upstream-60.4.0-125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-60.4.0-125.1">MozillaFirefox-buildsymbols-60.4.0-125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-devel-60.4.0-125.1">MozillaFirefox-devel-60.4.0-125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.4.0-125.1">MozillaFirefox-translations-common-60.4.0-125.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-60.4.0-125.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-60.4.0-125.1">MozillaFirefox-translations-other-60.4.0-125.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1">MozillaFirefox-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1">MozillaFirefox-branding-upstream-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1">MozillaFirefox-buildsymbols-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1">MozillaFirefox-devel-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1">MozillaFirefox-translations-common-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-60.4.0-125.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1">MozillaFirefox-translations-other-60.4.0-125.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-12405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12405.html</URL>
        <Description>CVE-2018-12405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-17466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17466.html</URL>
        <Description>CVE-2018-17466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18492.html</URL>
        <Description>CVE-2018-18492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18493</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18493.html</URL>
        <Description>CVE-2018-18493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18494.html</URL>
        <Description>CVE-2018-18494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.4.0-125.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.4.0-125.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-12/msg00029.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18498.html</URL>
        <Description>CVE-2018-18498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
