<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:3769-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-11-14T13:15:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-11-14T13:15:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-11-14T13:15:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

Thunderbird 63 ESR was updated to version 60.3.0 to fix the following issues (bsc#1112852):

Security issues fixed (MFSA 2018-28):

- CVE-2018-12389: Fixed memory safety bugs.
- CVE-2018-12390: Fixed memory safety bugs.
- CVE-2018-12391: Fixed HTTP Live Stream audio data is accessible cross-origin.
- CVE-2018-12392: Fixed crash with nested event loops.
- CVE-2018-12393: Fixed integer overflow during Unicode conversion while loading JavaScript.

Non-security issues fixed:

- various theme fixes
- Shift+PageUp/PageDown in Write window
- Gloda attachment filtering
- Mailing list address auto-complete enter/return handling
- Thunderbird hung if HTML signature references non-existent image
- Filters not working for headers that appear more than once
- Update _constraints for armv6/7
- Add memory-constraints to avoid OOM errors
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Product-WE-15-2018-2660</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      <Description>Link for SUSE-SU-2018:3769-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-November/004851.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:3769-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1112852</URL>
      <Description>SUSE Bug 1112852</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12389/</URL>
      <Description>SUSE CVE CVE-2018-12389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12390/</URL>
      <Description>SUSE CVE CVE-2018-12390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12391/</URL>
      <Description>SUSE CVE CVE-2018-12391 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12392/</URL>
      <Description>SUSE CVE CVE-2018-12392 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12393/</URL>
      <Description>SUSE CVE CVE-2018-12393 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Workstation Extension 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Workstation Extension 15">
        <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15" CPE="cpe:/o:suse:sle-we:15">SUSE Linux Enterprise Workstation Extension 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-60.3.0-3.17.2">
      <FullProductName ProductID="MozillaThunderbird-60.3.0-3.17.2">MozillaThunderbird-60.3.0-3.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-60.3.0-3.17.2">
      <FullProductName ProductID="MozillaThunderbird-translations-common-60.3.0-3.17.2">MozillaThunderbird-translations-common-60.3.0-3.17.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-60.3.0-3.17.2">
      <FullProductName ProductID="MozillaThunderbird-translations-other-60.3.0-3.17.2">MozillaThunderbird-translations-other-60.3.0-3.17.2</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-60.3.0-3.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2">MozillaThunderbird-60.3.0-3.17.2 as a component of SUSE Linux Enterprise Workstation Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-60.3.0-3.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2">MozillaThunderbird-translations-common-60.3.0-3.17.2 as a component of SUSE Linux Enterprise Workstation Extension 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-60.3.0-3.17.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Workstation Extension 15">
      <FullProductName ProductID="SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2">MozillaThunderbird-translations-other-60.3.0-3.17.2 as a component of SUSE Linux Enterprise Workstation Extension 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR &lt; 60.3 and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12389.html</URL>
        <Description>CVE-2018-12389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 62 and Firefox ESR 60.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12390.html</URL>
        <Description>CVE-2018-12390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During HTTP Live Stream playback on Firefox for Android, audio data can be accessed across origins in violation of security policies. Because the problem is in the underlying Android service, this issue is addressed by treating all HLS streams as cross-origin and opaque to access. *Note: this issue only affects Firefox for Android. Desktop versions of Firefox are unaffected.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12391</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>9.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:C/I:C/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12391.html</URL>
        <Description>CVE-2018-12391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When manipulating user events in nested loops while opening a document through script, it is possible to trigger a potentially exploitable crash due to poor event handling. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12392</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12392.html</URL>
        <Description>CVE-2018-12392</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential vulnerability was found in 32-bit builds where an integer overflow during the conversion of scripts to an internal UTF-16 representation could result in allocating a buffer too small for the conversion. This leads to a possible out-of-bounds write. *Note: 64-bit builds are not vulnerable to this issue.*. This vulnerability affects Firefox &lt; 63, Firefox ESR &lt; 60.3, and Thunderbird &lt; 60.3.</Note>
    </Notes>
    <CVE>CVE-2018-12393</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-common-60.3.0-3.17.2</ProductID>
        <ProductID>SUSE Linux Enterprise Workstation Extension 15:MozillaThunderbird-translations-other-60.3.0-3.17.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20183769-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12393.html</URL>
        <Description>CVE-2018-12393</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112852</URL>
        <Description>SUSE Bug 1112852</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
