<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:2298-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2018-08-10T09:36:01Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2018-08-10T09:36:01Z</InitialReleaseDate>
    <CurrentReleaseDate>2018-08-10T09:36:01Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox to the 52.9 ESR release fixes the following issues:

These security issues were fixed:

- Firefox ESR 52.9:
- CVE-2018-5188 Memory safety bugs fixed in Firefox 60, Firefox ESR 60.1, and Firefox ESR 52.9 (bsc#1098998). 
- CVE-2018-12368 No warning when opening executable SettingContent-ms files (bsc#1098998).
- CVE-2018-12366 Invalid data handling during QCMS transformations (bsc#1098998).
- CVE-2018-12365 Compromised IPC child process can list local filenames (bsc#1098998).
- CVE-2018-12364 CSRF attacks through 307 redirects and NPAPI plugins (bsc#1098998).
- CVE-2018-12363 Use-after-free when appending DOM nodes (bsc#1098998).
- CVE-2018-12362 Integer overflow in SSSE3 scaler (bsc#1098998).
- CVE-2018-12360 Use-after-free when using focus() (bsc#1098998).
- CVE-2018-5156 Media recorder segmentation fault when track type is changed during capture (bsc#1098998).
- CVE-2018-12359 Buffer overflow using computed size of canvas element (bsc#1098998).

- Firefox ESR 52.8:
- CVE-2018-6126: Prevent heap buffer overflow in rasterizing paths in SVG with Skia (bsc#1096449).
- CVE-2018-5183: Backport critical security fixes in Skia (bsc#1092548).
- CVE-2018-5154: Use-after-free with SVG animations and clip paths (bsc#1092548).
- CVE-2018-5155: Use-after-free with SVG animations and text paths (bsc#1092548).
- CVE-2018-5157: Same-origin bypass of PDF Viewer to view protected PDF files (bsc#1092548).
- CVE-2018-5158: Malicious PDF can inject JavaScript into PDF Viewer (bsc#1092548).
- CVE-2018-5159: Integer overflow and out-of-bounds write in Skia (bsc#1092548).
- CVE-2018-5168: Lightweight themes can be installed without user interaction (bsc#1092548).
- CVE-2018-5178: Buffer overflow during UTF-8 to Unicode string conversion through legacy extension (bsc#1092548).
- CVE-2018-5150: Memory safety bugs fixed in Firefox 60 and Firefox ESR 52.8 (bsc#1092548).

These non-security issues were fixed:

- Various stability and regression fixes
- Performance improvements to the Safe Browsing service to avoid slowdowns
  while updating site classification data
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-Module-Desktop-Applications-15-2018-1536</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      <Description>Link for SUSE-SU-2018:2298-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2018-August/004400.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:2298-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1092548</URL>
      <Description>SUSE Bug 1092548</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1096449</URL>
      <Description>SUSE Bug 1096449</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1098998</URL>
      <Description>SUSE Bug 1098998</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12359/</URL>
      <Description>SUSE CVE CVE-2018-12359 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12360/</URL>
      <Description>SUSE CVE CVE-2018-12360 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12362/</URL>
      <Description>SUSE CVE CVE-2018-12362 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12363/</URL>
      <Description>SUSE CVE CVE-2018-12363 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12364/</URL>
      <Description>SUSE CVE CVE-2018-12364 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12365/</URL>
      <Description>SUSE CVE CVE-2018-12365 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12366/</URL>
      <Description>SUSE CVE CVE-2018-12366 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12368/</URL>
      <Description>SUSE CVE CVE-2018-12368 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5150/</URL>
      <Description>SUSE CVE CVE-2018-5150 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5154/</URL>
      <Description>SUSE CVE CVE-2018-5154 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5155/</URL>
      <Description>SUSE CVE CVE-2018-5155 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5156/</URL>
      <Description>SUSE CVE CVE-2018-5156 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5157/</URL>
      <Description>SUSE CVE CVE-2018-5157 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5158/</URL>
      <Description>SUSE CVE CVE-2018-5158 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5159/</URL>
      <Description>SUSE CVE CVE-2018-5159 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5168/</URL>
      <Description>SUSE CVE CVE-2018-5168 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5178/</URL>
      <Description>SUSE CVE CVE-2018-5178 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5183/</URL>
      <Description>SUSE CVE CVE-2018-5183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-5188/</URL>
      <Description>SUSE CVE CVE-2018-5188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-6126/</URL>
      <Description>SUSE CVE CVE-2018-6126 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Module for Desktop Applications 15">
        <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15" CPE="cpe:/o:suse:sle-module-desktop-applications:15">SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-52.9.0esr-3.7.12">
      <FullProductName ProductID="MozillaFirefox-52.9.0esr-3.7.12">MozillaFirefox-52.9.0esr-3.7.12</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-52.9.0esr-3.7.12">
      <FullProductName ProductID="MozillaFirefox-devel-52.9.0esr-3.7.12">MozillaFirefox-devel-52.9.0esr-3.7.12</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-52.9.0esr-3.7.12">
      <FullProductName ProductID="MozillaFirefox-translations-common-52.9.0esr-3.7.12">MozillaFirefox-translations-common-52.9.0esr-3.7.12</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-52.9.0esr-3.7.12">
      <FullProductName ProductID="MozillaFirefox-translations-other-52.9.0esr-3.7.12">MozillaFirefox-translations-other-52.9.0esr-3.7.12</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-52.9.0esr-3.7.12" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12">MozillaFirefox-52.9.0esr-3.7.12 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-52.9.0esr-3.7.12" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12">MozillaFirefox-devel-52.9.0esr-3.7.12 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-52.9.0esr-3.7.12" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12">MozillaFirefox-translations-common-52.9.0esr-3.7.12 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-52.9.0esr-3.7.12" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Module for Desktop Applications 15">
      <FullProductName ProductID="SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12">MozillaFirefox-translations-other-52.9.0esr-3.7.12 as a component of SUSE Linux Enterprise Module for Desktop Applications 15</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur when rendering canvas content while adjusting the height and width of the canvas element dynamically, causing data to be written outside of the currently computed boundaries. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12359</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12359.html</URL>
        <Description>CVE-2018-12359</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when deleting an input element during a mutation event handler triggered by focusing that element. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12360</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12360.html</URL>
        <Description>CVE-2018-12360</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur during graphics operations done by the Supplemental Streaming SIMD Extensions 3 (SSSE3) scaler, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12362</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12362.html</URL>
        <Description>CVE-2018-12362</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur when script uses mutation events to move DOM nodes between documents, resulting in the old document that held the node being freed but the node still having a pointer referencing it. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12363</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12363.html</URL>
        <Description>CVE-2018-12363</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">NPAPI plugins, such as Adobe Flash, can send non-simple cross-origin requests, bypassing CORS by making a same-origin POST that does a 307 redirect to the target site. This allows for a malicious site to engage in cross-site request forgery (CSRF) attacks. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12364</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12364.html</URL>
        <Description>CVE-2018-12364</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A compromised IPC child process can escape the content sandbox and list the names of arbitrary files on the file system without user consent or interaction. This could result in exposure of private local files. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12365</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12365.html</URL>
        <Description>CVE-2018-12365</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An invalid grid size during QCMS (color profile) transformations can result in the out-of-bounds read interpreted as a float value. This could leak private data into the output. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12366</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12366.html</URL>
        <Description>CVE-2018-12366</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Windows 10 does not warn users before opening executable files with the SettingContent-ms extension even when they have been downloaded from the internet and have the "Mark of the Web." Without the warning, unsuspecting users unfamiliar with this new file type might run an unwanted executable. This also allows a WebExtension with the limited downloads.open permission to execute arbitrary code without user interaction on Windows 10 systems. *Note: this issue only affects Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-12368</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12368.html</URL>
        <Description>CVE-2018-12368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 59, Firefox ESR 52.7, and Thunderbird 52.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5150</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5150.html</URL>
        <Description>CVE-2018-5150</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur while enumerating attributes during SVG animations with clip paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5154</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5154.html</URL>
        <Description>CVE-2018-5154</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur while adjusting layout during SVG animations with text paths. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5155</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5155.html</URL>
        <Description>CVE-2018-5155</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability can occur when capturing a media stream when the media source type is changed as the capture is occurring. This can result in stream data being cast to the wrong type causing a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5156</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5156.html</URL>
        <Description>CVE-2018-5156</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Same-origin protections for the PDF viewer can be bypassed, allowing a malicious site to intercept messages meant for the viewer. This could allow the site to retrieve PDF files restricted to viewing by an authenticated user on a third-party website. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.</Note>
    </Notes>
    <CVE>CVE-2018-5157</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5157.html</URL>
        <Description>CVE-2018-5157</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PDF viewer does not sufficiently sanitize PostScript calculator functions, allowing malicious JavaScript to be injected through a crafted PDF file. This JavaScript can then be run with the permissions of the PDF viewer by its worker. This vulnerability affects Firefox ESR &lt; 52.8 and Firefox &lt; 60.</Note>
    </Notes>
    <CVE>CVE-2018-5158</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5158.html</URL>
        <Description>CVE-2018-5158</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow can occur in the Skia library due to 32-bit integer use in an array without integer overflow checks, resulting in possible out-of-bounds writes. This could lead to a potentially exploitable crash triggerable by web content. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5159</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5159.html</URL>
        <Description>CVE-2018-5159</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Sites can bypass security checks on permissions to install lightweight themes by manipulating the "baseURI" property of the theme element. This could allow a malicious site to install a theme without user interaction which could contain offensive or embarrassing images. This vulnerability affects Thunderbird &lt; 52.8, Thunderbird ESR &lt; 52.8, Firefox &lt; 60, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5168</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5168.html</URL>
        <Description>CVE-2018-5168</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow was found during UTF8 to Unicode string conversion within JavaScript with extremely large amounts of data. This vulnerability requires the use of a malicious or vulnerable legacy extension in order to occur. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5178</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5178.html</URL>
        <Description>CVE-2018-5178</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers backported selected changes in the Skia library. These changes correct memory corruption issues including invalid buffer reads and writes during graphic operations. This vulnerability affects Thunderbird ESR &lt; 52.8, Thunderbird &lt; 52.8, and Firefox ESR &lt; 52.8.</Note>
    </Notes>
    <CVE>CVE-2018-5183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5183.html</URL>
        <Description>CVE-2018-5183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092548</URL>
        <Description>SUSE Bug 1092548</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1092611</URL>
        <Description>SUSE Bug 1092611</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093969</URL>
        <Description>SUSE Bug 1093969</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093970</URL>
        <Description>SUSE Bug 1093970</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093971</URL>
        <Description>SUSE Bug 1093971</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093972</URL>
        <Description>SUSE Bug 1093972</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1093973</URL>
        <Description>SUSE Bug 1093973</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs present in Firefox 60, Firefox ESR 60, and Firefox ESR 52.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60, Thunderbird &lt; 52.9, Firefox ESR &lt; 60.1, Firefox ESR &lt; 52.9, and Firefox &lt; 61.</Note>
    </Notes>
    <CVE>CVE-2018-5188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-5188.html</URL>
        <Description>CVE-2018-5188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1098998</URL>
        <Description>SUSE Bug 1098998</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-6126</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-devel-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-common-52.9.0esr-3.7.12</ProductID>
        <ProductID>SUSE Linux Enterprise Module for Desktop Applications 15:MozillaFirefox-translations-other-52.9.0esr-3.7.12</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20182298-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-6126.html</URL>
        <Description>CVE-2018-6126</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1095163</URL>
        <Description>SUSE Bug 1095163</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1096449</URL>
        <Description>SUSE Bug 1096449</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
