<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2018:2996-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-04T07:35:50Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-04T07:35:50Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-04T07:35:50Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for Mozilla Firefox to version 60.2.2esr contains the following security fixes (MFSA 2018-24):

- CVE-2018-12386: Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may enable exploits in the sandboxed content process  (bsc#1110507)</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html</URL>
      <Description>E-Mail link for openSUSE-SU-2018:2996-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.3">
      <Branch Type="Product Name" Name="openSUSE Leap 42.3">
        <FullProductName ProductID="openSUSE Leap 42.3">openSUSE Leap 42.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-60.2.2-118.1">MozillaFirefox-60.2.2-118.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-60.2.2-118.1">MozillaFirefox-branding-upstream-60.2.2-118.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-60.2.2-118.1">MozillaFirefox-buildsymbols-60.2.2-118.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-devel-60.2.2-118.1">MozillaFirefox-devel-60.2.2-118.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.2.2-118.1">MozillaFirefox-translations-common-60.2.2-118.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-60.2.2-118.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-60.2.2-118.1">MozillaFirefox-translations-other-60.2.2-118.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-60.2.2-118.1">MozillaFirefox-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.2-118.1">MozillaFirefox-branding-upstream-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.2-118.1">MozillaFirefox-buildsymbols-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-devel-60.2.2-118.1">MozillaFirefox-devel-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.2-118.1">MozillaFirefox-translations-common-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-60.2.2-118.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.3">
      <FullProductName ProductID="openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.2-118.1">MozillaFirefox-translations-other-60.2.2-118.1 as a component of openSUSE Leap 42.3</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.</Note>
    </Notes>
    <CVE>CVE-2018-12386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.2-118.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12386.html</URL>
        <Description>CVE-2018-12386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110506</URL>
        <Description>SUSE Bug 1110506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.</Note>
    </Notes>
    <CVE>CVE-2018-12387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-branding-upstream-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-buildsymbols-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-devel-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-common-60.2.2-118.1</ProductID>
        <ProductID>openSUSE Leap 42.3:MozillaFirefox-translations-other-60.2.2-118.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2018-10/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12387.html</URL>
        <Description>CVE-2018-12387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110507</URL>
        <Description>SUSE Bug 1110507</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
