<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3749-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-12-06T12:51:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-12-06T12:51:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-12-06T12:51:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox fixes the following issues:

Security issues fixed:

- Update to Mozilla Firefox 60.3.0esr: MFSA 2018-27 (bsc#1112852)
- CVE-2018-12392: Crash with nested event loops.
- CVE-2018-12393: Integer overflow during Unicode conversion while loading JavaScript.
- CVE-2018-12395: WebExtension bypass of domain restrictions through header rewriting.
- CVE-2018-12396: WebExtension content scripts can execute in disallowed contexts.
- CVE-2018-12397: WebExtension local file access vulnerability.
- CVE-2018-12389: Memory safety bugs fixed in Firefox ESR 60.3.
- CVE-2018-12390: Memory safety bugs fixed in Firefox 63 and Firefox ESR 60.3.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP4-2018-2648,SUSE-SLE-SDK-12-SP4-2018-2648,SUSE-SLE-SERVER-12-SP4-2018-2648</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      <Description>Link for SUSE-SU-2018:3749-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-December/004932.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3749-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112852</URL>
      <Description>SUSE Bug 1112852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12389/</URL>
      <Description>SUSE CVE CVE-2018-12389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12390/</URL>
      <Description>SUSE CVE CVE-2018-12390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12392/</URL>
      <Description>SUSE CVE CVE-2018-12392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12393/</URL>
      <Description>SUSE CVE CVE-2018-12393 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12395/</URL>
      <Description>SUSE CVE CVE-2018-12395 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12396/</URL>
      <Description>SUSE CVE CVE-2018-12396 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12397/</URL>
      <Description>SUSE CVE CVE-2018-12397 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP4" CPE="cpe:/o:suse:sled:12:sp4">SUSE Linux Enterprise Desktop 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4" CPE="cpe:/o:suse:sles:12:sp4">SUSE Linux Enterprise Server 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP4" CPE="cpe:/o:suse:sles_sap:12:sp4">SUSE Linux Enterprise Server for SAP Applications 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP4" CPE="cpe:/o:suse:sle-sdk:12:sp4">SUSE Linux Enterprise Software Development Kit 12 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.3.0-109.50.2">
      <FullProductName ProductID="MozillaFirefox-60.3.0-109.50.2">MozillaFirefox-60.3.0-109.50.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.3.0-109.50.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.3.0-109.50.2">MozillaFirefox-translations-common-60.3.0-109.50.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.3.0-109.50.2">
      <FullProductName ProductID="MozillaFirefox-devel-60.3.0-109.50.2">MozillaFirefox-devel-60.3.0-109.50.2</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2">MozillaFirefox-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Desktop 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2">MozillaFirefox-translations-common-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Desktop 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2">MozillaFirefox-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Server 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2">MozillaFirefox-translations-common-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Server 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2">MozillaFirefox-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2">MozillaFirefox-translations-common-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.3.0-109.50.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2">MozillaFirefox-devel-60.3.0-109.50.2 as a component of SUSE Linux Enterprise Software Development Kit 12 SP4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12389.html</URL>
        <Description>CVE-2018-12389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12390.html</URL>
        <Description>CVE-2018-12390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12392.html</URL>
        <Description>CVE-2018-12392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12393.html</URL>
        <Description>CVE-2018-12393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">By rewriting the Host: request headers using the webRequest API, a WebExtension can bypass domain restrictions through domain fronting. This would allow access to domains that share a host that are otherwise restricted. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12395</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12395.html</URL>
        <Description>CVE-2018-12395</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability where a WebExtension can run content scripts in disallowed contexts following navigation or other events. This allows for potential privilege escalation by the WebExtension on sites where content scripts should not be run. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12396</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12396.html</URL>
        <Description>CVE-2018-12396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A WebExtension can request access to local files without the warning prompt stating that the extension will "Access your data for all websites" being displayed to the user. This allows extensions to run content scripts in local pages without permission warnings when a local file is opened. This vulnerability affects Firefox ESR &lt; 60.3 and Firefox &lt; 63.</Note>
    </Notes>
    <CVE>CVE-2018-12397</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP4:MozillaFirefox-translations-common-60.3.0-109.50.2</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP4:MozillaFirefox-devel-60.3.0-109.50.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>3.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183749-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12397.html</URL>
        <Description>CVE-2018-12397</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
