<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2325-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-14T13:58:21Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-14T13:58:21Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-14T13:58:21Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox to version ESR 52.9 fixes the following issues:

- CVE-2018-5188: Various memory safety bugs (bsc#1098998)
- CVE-2018-12368: No warning when opening executable SettingContent-ms files
- CVE-2018-12366: Invalid data handling during QCMS transformations
- CVE-2018-12365: Compromised IPC child process can list local filenames
- CVE-2018-12364: CSRF attacks through 307 redirects and NPAPI plugins
- CVE-2018-12363: Use-after-free when appending DOM nodes
- CVE-2018-12362: Integer overflow in SSSE3 scaler
- CVE-2018-12360: Use-after-free when using focus()
- CVE-2018-5156: Media recorder segmentation fault when track type is changed during capture
- CVE-2018-12359: Buffer overflow using computed size of canvas element
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-MozillaFirefox-13723,sleposp3-MozillaFirefox-13723,slessp3-MozillaFirefox-13723,slessp4-MozillaFirefox-13723</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      <Description>Link for SUSE-SU-2018:2325-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-August/004413.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2325-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098998</URL>
      <Description>SUSE Bug 1098998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12359/</URL>
      <Description>SUSE CVE CVE-2018-12359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12360/</URL>
      <Description>SUSE CVE CVE-2018-12360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12362/</URL>
      <Description>SUSE CVE CVE-2018-12362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12363/</URL>
      <Description>SUSE CVE CVE-2018-12363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12364/</URL>
      <Description>SUSE CVE CVE-2018-12364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12365/</URL>
      <Description>SUSE CVE CVE-2018-12365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12366/</URL>
      <Description>SUSE CVE CVE-2018-12366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12368/</URL>
      <Description>SUSE CVE CVE-2018-12368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5156/</URL>
      <Description>SUSE CVE CVE-2018-5156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5188/</URL>
      <Description>SUSE CVE CVE-2018-5188 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp3">SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-52.9.0esr-72.38.6">
      <FullProductName ProductID="MozillaFirefox-devel-52.9.0esr-72.38.6">MozillaFirefox-devel-52.9.0esr-72.38.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-52.9.0esr-72.38.6">
      <FullProductName ProductID="MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-52.9.0esr-72.38.6">
      <FullProductName ProductID="MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6">MozillaFirefox-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6">MozillaFirefox-translations-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-52.9.0esr-72.38.6" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6">MozillaFirefox-devel-52.9.0esr-72.38.6 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12359.html</URL>
        <Description>CVE-2018-12359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12360.html</URL>
        <Description>CVE-2018-12360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12362.html</URL>
        <Description>CVE-2018-12362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12363.html</URL>
        <Description>CVE-2018-12363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12364.html</URL>
        <Description>CVE-2018-12364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12365.html</URL>
        <Description>CVE-2018-12365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12366.html</URL>
        <Description>CVE-2018-12366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12368.html</URL>
        <Description>CVE-2018-12368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5156.html</URL>
        <Description>CVE-2018-5156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-52.9.0esr-72.38.6</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-52.9.0esr-72.38.6</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182325-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5188.html</URL>
        <Description>CVE-2018-5188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
