<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2674-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-09-08T07:21:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-09-08T07:21:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-09-08T07:21:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Firefox 60.2.0esr fixes the following issues:

Security issues fixed (MFSA 2018-21, boo#1107343):

- CVE-2018-12377: Use-after-free in refresh driver timers
- CVE-2018-12378: Use-after-free in IndexedDB
- CVE-2017-16541: Proxy bypass using automount and autofs (boo#1066489)
- CVE-2018-12376: Memory safety bugs fixed in Firefox 62 and Firefox ESR 60.2 
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2674-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-60.2.0-109.1">MozillaFirefox-60.2.0-109.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-60.2.0-109.1">MozillaFirefox-branding-upstream-60.2.0-109.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-60.2.0-109.1">MozillaFirefox-buildsymbols-60.2.0-109.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-devel-60.2.0-109.1">MozillaFirefox-devel-60.2.0-109.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.2.0-109.1">MozillaFirefox-translations-common-60.2.0-109.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-60.2.0-109.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-60.2.0-109.1">MozillaFirefox-translations-other-60.2.0-109.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-60.2.0-109.1">MozillaFirefox-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.0-109.1">MozillaFirefox-branding-upstream-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.0-109.1">MozillaFirefox-buildsymbols-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-devel-60.2.0-109.1">MozillaFirefox-devel-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.0-109.1">MozillaFirefox-translations-common-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-60.2.0-109.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.0-109.1">MozillaFirefox-translations-other-60.2.0-109.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Tor Browser before 7.0.9 on macOS and Linux allows remote attackers to bypass the intended anonymity feature and discover a client IP address via vectors involving a crafted web site that leverages file:// mishandling in Firefox, aka TorMoil. NOTE: Tails is unaffected.</Note>
    </Notes>
    <CVE>CVE-2017-16541</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.0-109.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-16541.html</URL>
        <Description>CVE-2017-16541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1066489</URL>
        <Description>SUSE Bug 1066489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107343</URL>
        <Description>SUSE Bug 1107343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 61 and Firefox ESR 60.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.</Note>
    </Notes>
    <CVE>CVE-2018-12376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.0-109.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12376.html</URL>
        <Description>CVE-2018-12376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107343</URL>
        <Description>SUSE Bug 1107343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when refresh driver timers are refreshed in some circumstances during shutdown when the timer is deleted while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.</Note>
    </Notes>
    <CVE>CVE-2018-12377</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.0-109.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12377.html</URL>
        <Description>CVE-2018-12377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107343</URL>
        <Description>SUSE Bug 1107343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when an IndexedDB index is deleted while still in use by JavaScript code that is providing payload values to be stored. This results in a potentially exploitable crash. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2, and Thunderbird &lt; 60.2.1.</Note>
    </Notes>
    <CVE>CVE-2018-12378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.0-109.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.0-109.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-09/msg00020.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12378.html</URL>
        <Description>CVE-2018-12378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107343</URL>
        <Description>SUSE Bug 1107343</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
