<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2020:0003-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2020-01-09T16:29:51Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2020-01-09T16:29:51Z</InitialReleaseDate>
    <CurrentReleaseDate>2020-01-09T16:29:51Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaThunderbird fixes the following issues:

Mozilla Thunderbird was updated to 68.3esr (MFSA 2019-38 bsc#1158328) 	  

Security issues fixed: 

- CVE-2019-17008: Fixed a use-after-free in worker destruction (bmo#1546331)
- CVE-2019-13722: Fixed a stack corruption due to incorrect number of arguments 
  in WebRTC code (bmo#1580156)
- CVE-2019-11745: Fixed an out of bounds write in NSS when encrypting with a 
  block cipher (bmo#1586176)
- CVE-2019-17009: Fixed an issue where updater temporary files accessible to 
  unprivileged processes (bmo#1510494)
- CVE-2019-17010: Fixed a use-after-free when performing device orientation 
  checks (bmo#1581084)
- CVE-2019-17005: Fixed a buffer overflow in plain text serializer (bmo#1584170)
- CVE-2019-17011: Fixed a use-after-free when retrieving a document 
  in antitracking (bmo#1591334)
- CVE-2019-17012: Fixed multiple memmory issues
  (bmo#1449736, bmo#1533957, bmo#1560667,bmo#1567209, bmo#1580288, bmo#1585760, 
  bmo#1592502)

Other issues addressed:

- New: Message display toolbar action WebExtension API (bmo#1531597)
- New: Navigation buttons are now available in content tabs (bmo#787683)
- Fixed an issue where write window was not always correct (bmo#1593280)
- Fixed toolbar issues (bmo#1584160)
- Fixed issues with LDAP lookup when SSL was enabled (bmo#1576364)
- Fixed an issue with scam link confirmation panel (bmo#1596413)
- Fixed an issue with the write window where the Link Properties 
  dialog was not showing named anchors in context menu (bmo#1593629)
- Fixed issues with calendar (bmo#1588516)
- Fixed issues with chat where reordering via drag-and-drop was not working
  on Instant messaging status dialog (bmo#1591505)

This update was imported from the SUSE:SLE-15:Update update project.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2020-3</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      <Description>E-Mail link for openSUSE-SU-2020:0003-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-11745/</URL>
      <Description>SUSE CVE CVE-2019-11745 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-13722/</URL>
      <Description>SUSE CVE CVE-2019-13722 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17005/</URL>
      <Description>SUSE CVE CVE-2019-17005 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17008/</URL>
      <Description>SUSE CVE CVE-2019-17008 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17009/</URL>
      <Description>SUSE CVE CVE-2019-17009 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17010/</URL>
      <Description>SUSE CVE CVE-2019-17010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17011/</URL>
      <Description>SUSE CVE CVE-2019-17011 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2019-17012/</URL>
      <Description>SUSE CVE CVE-2019-17012 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 15.1">
      <Branch Type="Product Name" Name="openSUSE Leap 15.1">
        <FullProductName ProductID="openSUSE Leap 15.1" CPE="cpe:/o:opensuse:leap:15.1">openSUSE Leap 15.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-68.3.0-lp151.2.19.1">
      <FullProductName ProductID="MozillaThunderbird-68.3.0-lp151.2.19.1">MozillaThunderbird-68.3.0-lp151.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1">MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1">MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-68.3.0-lp151.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1">MozillaThunderbird-68.3.0-lp151.2.19.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1">MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.1">
      <FullProductName ProductID="openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1">MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1 as a component of openSUSE Leap 15.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-11745</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-11745.html</URL>
        <Description>CVE-2019-11745</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158527</URL>
        <Description>SUSE Bug 1158527</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2019-13722</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-13722.html</URL>
        <Description>CVE-2019-13722</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The plain text serializer used a fixed-size array for the number of &lt;ol&gt; elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17005</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17005.html</URL>
        <Description>CVE-2019-17005</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17008</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17008.html</URL>
        <Description>CVE-2019-17008</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17009</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:L/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17009.html</URL>
        <Description>CVE-2019-17009</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17010.html</URL>
        <Description>CVE-2019-17010</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17011</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17011.html</URL>
        <Description>CVE-2019-17011</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 68.3, Firefox ESR &lt; 68.3, and Firefox &lt; 71.</Note>
    </Notes>
    <CVE>CVE-2019-17012</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.3.0-lp151.2.19.1</ProductID>
        <ProductID>openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.3.0-lp151.2.19.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NRHDWT3QC423VY6ACEY346YD3PPCAECZ/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2019-17012.html</URL>
        <Description>CVE-2019-17012</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1158328</URL>
        <Description>SUSE Bug 1158328</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
