<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3476-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-10-25T18:09:44Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-10-25T18:09:44Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-10-25T18:09:44Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
  
This update for MozillaFirefox to 60.2.2ESR fixes the following issues:

Security issues fixed:

MFSA 2018-24:

- CVE-2018-12386: A Type confusion in JavaScript allowed remote code execution (bsc#1110506)
- CVE-2018-12387: Array.prototype.push stack pointer vulnerability may have enabled exploits in the sandboxed content process (bsc#1110507)

MFSA 2018-23:

- CVE-2018-12385: Fixed a crash in TransportSecurityInfo due to cached data (bsc#1109363)
- CVE-2018-12383: Setting a master password did not delete unencrypted previously stored passwords (bsc#1107343)
 
Non security issues fixed:

- Avoid undefined behavior in IPC fd-passing code (bsc#1094767)
- Fixed a startup crash affecting users migrating from older ESR releases
- Clean up old NSS DB files after upgrading
- Fixed an endianness problem in bindgen's handling of
  bitfields, which was causing Firefox to crash on startup on big-endian
  machines.  Also, updates the cc crate, which was buggy in the version
  that was originally vendored in. (bsc#1109465)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Desktop-Applications-15-2018-2482</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183476-1/</URL>
      <Description>Link for SUSE-SU-2018:3476-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-October/004797.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3476-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1094767</URL>
      <Description>SUSE Bug 1094767</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1107343</URL>
      <Description>SUSE Bug 1107343</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109363</URL>
      <Description>SUSE Bug 1109363</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1109465</URL>
      <Description>SUSE Bug 1109465</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110506</URL>
      <Description>SUSE Bug 1110506</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1110507</URL>
      <Description>SUSE Bug 1110507</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12383/</URL>
      <Description>SUSE CVE CVE-2018-12383 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12385/</URL>
      <Description>SUSE CVE CVE-2018-12385 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12386/</URL>
      <Description>SUSE CVE CVE-2018-12386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12387/</URL>
      <Description>SUSE CVE CVE-2018-12387 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15" CPE="cpe:/o:suse:sle-module-desktop-applications:15">SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.2.2-3.13.3">
      <FullProductName ProductID="MozillaFirefox-60.2.2-3.13.3">MozillaFirefox-60.2.2-3.13.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-SLE-60-4.5.3">
      <FullProductName ProductID="MozillaFirefox-branding-SLE-60-4.5.3">MozillaFirefox-branding-SLE-60-4.5.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.2.2-3.13.3">
      <FullProductName ProductID="MozillaFirefox-devel-60.2.2-3.13.3">MozillaFirefox-devel-60.2.2-3.13.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.2.2-3.13.3">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.2.2-3.13.3">MozillaFirefox-translations-common-60.2.2-3.13.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-60.2.2-3.13.3">
      <FullProductName ProductID="MozillaFirefox-translations-other-60.2.2-3.13.3">MozillaFirefox-translations-other-60.2.2-3.13.3</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.2.2-3.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3">MozillaFirefox-60.2.2-3.13.3 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-SLE-60-4.5.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3">MozillaFirefox-branding-SLE-60-4.5.3 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.2.2-3.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3">MozillaFirefox-devel-60.2.2-3.13.3 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.2.2-3.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3">MozillaFirefox-translations-common-60.2.2-3.13.3 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-60.2.2-3.13.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-60.2.2-3.13.3">MozillaFirefox-translations-other-60.2.2-3.13.3 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">If a user saved passwords before Firefox 58 and then later set a master password, an unencrypted copy of these passwords is still accessible. This is because the older stored password file was not deleted when the data was copied to a new format starting in Firefox 58. The new master password is added only on the new file. This could allow the exposure of stored password data outside of user expectations. This vulnerability affects Firefox &lt; 62, Firefox ESR &lt; 60.2.1, and Thunderbird &lt; 60.2.1.</Note>
    </Notes>
    <CVE>CVE-2018-12383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-60.2.2-3.13.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.1</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12383.html</URL>
        <Description>CVE-2018-12383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107343</URL>
        <Description>SUSE Bug 1107343</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potentially exploitable crash in TransportSecurityInfo used for SSL can be triggered by data stored in the local cache in the user profile directory. This issue is only exploitable in combination with another vulnerability allowing an attacker to write data into the local cache or from locally installed malware. This issue also triggers a non-exploitable startup crash for users switching between the Nightly and Release versions of Firefox if the same profile is used. This vulnerability affects Thunderbird &lt; 60.2.1, Firefox ESR &lt; 60.2.1, and Firefox &lt; 62.0.2.</Note>
    </Notes>
    <CVE>CVE-2018-12385</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-60.2.2-3.13.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.4</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12385.html</URL>
        <Description>CVE-2018-12385</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1109363</URL>
        <Description>SUSE Bug 1109363</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.</Note>
    </Notes>
    <CVE>CVE-2018-12386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-60.2.2-3.13.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12386.html</URL>
        <Description>CVE-2018-12386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110506</URL>
        <Description>SUSE Bug 1110506</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR &lt; 60.2.2 and Firefox &lt; 62.0.3.</Note>
    </Notes>
    <CVE>CVE-2018-12387</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-branding-SLE-60-4.5.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-60.2.2-3.13.3</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-60.2.2-3.13.3</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.4</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183476-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12387.html</URL>
        <Description>CVE-2018-12387</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1110507</URL>
        <Description>SUSE Bug 1110507</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
