<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:0257-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-01-27T21:50:06Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-01-27T21:50:06Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-01-27T21:50:06Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird  to version 52.6 fixes several issues.

These security issues were fixed:

- CVE-2018-5095: Integer overflow in Skia library during edge builder
  allocation (bsc#1077291).
- CVE-2018-5096: Use-after-free while editing form elements (bsc#1077291).
- CVE-2018-5097: Use-after-free when source document is manipulated during XSLT
  (bsc#1077291).
- CVE-2018-5098: Use-after-free while manipulating form input elements
  (bsc#1077291).
- CVE-2018-5099: Use-after-free with widget listener (bsc#1077291).
- CVE-2018-5102: Use-after-free in HTML media elements (bsc#1077291).
- CVE-2018-5103: Use-after-free during mouse event handling (bsc#1077291).
- CVE-2018-5104: Use-after-free during font face manipulation (bsc#1077291).
- CVE-2018-5117: URL spoofing with right-to-left text aligned left-to-right
  (bsc#1077291).
- CVE-2018-5089: Various memory safety bugs (bsc#1077291).

These security issues were fixed:

- Searching message bodies of messages in local folders, including
  filter and quick filter operations, not working reliably: Content
  not found in base64-encode message parts, non-ASCII text not found
  and false positives found.
- Defective messages (without at least one expected header) not shown
  in IMAP folders but shown on mobile devices
- Calendar: Unintended task deletion if numlock is enabled
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2018-101</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      <Description>E-Mail link for openSUSE-SU-2018:0257-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1077291</URL>
      <Description>SUSE Bug 1077291</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5089/</URL>
      <Description>SUSE CVE CVE-2018-5089 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5095/</URL>
      <Description>SUSE CVE CVE-2018-5095 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5096/</URL>
      <Description>SUSE CVE CVE-2018-5096 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5097/</URL>
      <Description>SUSE CVE CVE-2018-5097 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5098/</URL>
      <Description>SUSE CVE CVE-2018-5098 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5099/</URL>
      <Description>SUSE CVE CVE-2018-5099 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5102/</URL>
      <Description>SUSE CVE CVE-2018-5102 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5103/</URL>
      <Description>SUSE CVE CVE-2018-5103 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5104/</URL>
      <Description>SUSE CVE CVE-2018-5104 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5117/</URL>
      <Description>SUSE CVE CVE-2018-5117 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-52.6-54.1">
      <FullProductName ProductID="MozillaThunderbird-52.6-54.1">MozillaThunderbird-52.6-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-52.6-54.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-52.6-54.1">MozillaThunderbird-buildsymbols-52.6-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-52.6-54.1">
      <FullProductName ProductID="MozillaThunderbird-devel-52.6-54.1">MozillaThunderbird-devel-52.6-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-52.6-54.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-52.6-54.1">MozillaThunderbird-translations-common-52.6-54.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-52.6-54.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-52.6-54.1">MozillaThunderbird-translations-other-52.6-54.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-52.6-54.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-52.6-54.1">MozillaThunderbird-52.6-54.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-52.6-54.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1">MozillaThunderbird-buildsymbols-52.6-54.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-52.6-54.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1">MozillaThunderbird-devel-52.6-54.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-52.6-54.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1">MozillaThunderbird-translations-common-52.6-54.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-52.6-54.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1">MozillaThunderbird-translations-other-52.6-54.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 57 and Firefox ESR 52.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5089</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5089.html</URL>
        <Description>CVE-2018-5089</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow vulnerability in the Skia library when allocating memory for edge builders on some systems with at least 8 GB of RAM. This results in the use of uninitialized memory, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5095</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5095.html</URL>
        <Description>CVE-2018-5095</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR &lt; 52.6 and Thunderbird &lt; 52.6.</Note>
    </Notes>
    <CVE>CVE-2018-5096</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5096.html</URL>
        <Description>CVE-2018-5096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur during XSL transformations when the source document for the transformation is manipulated by script content during the transformation. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5097</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5097.html</URL>
        <Description>CVE-2018-5097</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when form input elements, focus, and selections are manipulated by script content. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5098</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5098.html</URL>
        <Description>CVE-2018-5098</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when the widget listener is holding strong references to browser objects that have previously been freed, resulting in a potentially exploitable crash when these references are used. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5099</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5099.html</URL>
        <Description>CVE-2018-5099</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when manipulating HTML media elements with media streams, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5102</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5102.html</URL>
        <Description>CVE-2018-5102</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur during mouse event handling due to issues with multiprocess support. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5103</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5103.html</URL>
        <Description>CVE-2018-5103</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur during font face manipulation when a font face is freed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5104</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5104.html</URL>
        <Description>CVE-2018-5104</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If right-to-left text is used in the addressbar with left-to-right alignment, it is possible in some circumstances to scroll this text to spoof the displayed URL. This issue could result in the wrong URL being displayed as a location, which can mislead users to believe they are on a different site than the one loaded. This vulnerability affects Thunderbird &lt; 52.6, Firefox ESR &lt; 52.6, and Firefox &lt; 58.</Note>
    </Notes>
    <CVE>CVE-2018-5117</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-52.6-54.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-52.6-54.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IQKYFID4LB22UT3U2EOJ242RTGFRORJJ/#IQKYFID4LB22UT3U2EOJ242RTGFRORJJ</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5117.html</URL>
        <Description>CVE-2018-5117</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1077291</URL>
        <Description>SUSE Bug 1077291</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
