<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nspr and mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2018:4236-2</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2019-04-15T15:37:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2019-04-15T15:37:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2019-04-15T15:37:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nspr and mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox, mozilla-nss and mozilla-nspr fixes the following issues:

Issues fixed in MozillaFirefox:

- Update to Firefox ESR 60.4 (bsc#1119105)
- CVE-2018-17466: Fixed a buffer overflow and out-of-bounds read in ANGLE library with TextureStorage11
- CVE-2018-18492: Fixed a use-after-free with select element
- CVE-2018-18493: Fixed a buffer overflow in accelerated 2D canvas with Skia
- CVE-2018-18494: Fixed a Same-origin policy violation using location attribute and performance.getEntries
  to steal cross-origin URLs
- CVE-2018-18498: Fixed a integer overflow when calculating buffer sizes for images
- CVE-2018-12405: Fixed a few memory safety bugs

Issues fixed in mozilla-nss:

- Update to NSS 3.40.1 (bsc#1119105)
- CVE-2018-12404: Fixed a cache side-channel variant of the Bleichenbacher attack (bsc#1119069)
- CVE-2018-12384: Fixed an issue in the SSL handshake. NSS responded to an
  SSLv2-compatible ClientHello with a ServerHello that had an all-zero random. (bsc#1106873)
- CVE-2018-0495: Fixed a memory-cache side-channel attack with ECDSA signatures (bsc#1097410)
- Fixed a decryption failure during FFDHE key exchange
- Various security fixes in the ASN.1 code

Issues fixed in mozilla-nspr:

- Update mozilla-nspr to 4.20 (bsc#1119105)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-SAP-12-SP1-2019-952</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      <Description>Link for SUSE-SU-2018:4236-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2019-April/005339.html</URL>
      <Description>E-Mail link for SUSE-SU-2018:4236-2</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1097410</URL>
      <Description>SUSE Bug 1097410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1106873</URL>
      <Description>SUSE Bug 1106873</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119069</URL>
      <Description>SUSE Bug 1119069</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1119105</URL>
      <Description>SUSE Bug 1119105</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-0495/</URL>
      <Description>SUSE CVE CVE-2018-0495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12384/</URL>
      <Description>SUSE CVE CVE-2018-12384 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12404/</URL>
      <Description>SUSE CVE CVE-2018-12404 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-12405/</URL>
      <Description>SUSE CVE CVE-2018-12405 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-17466/</URL>
      <Description>SUSE CVE CVE-2018-17466 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18492/</URL>
      <Description>SUSE CVE CVE-2018-18492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18493/</URL>
      <Description>SUSE CVE CVE-2018-18493 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18494/</URL>
      <Description>SUSE CVE CVE-2018-18494 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2018-18498/</URL>
      <Description>SUSE CVE CVE-2018-18498 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-60.4.0esr-109.55.1">
      <FullProductName ProductID="MozillaFirefox-60.4.0esr-109.55.1">MozillaFirefox-60.4.0esr-109.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-60.4.0esr-109.55.1">
      <FullProductName ProductID="MozillaFirefox-devel-60.4.0esr-109.55.1">MozillaFirefox-devel-60.4.0esr-109.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-60.4.0esr-109.55.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-60.4.0esr-109.55.1">MozillaFirefox-translations-common-60.4.0esr-109.55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.40.1-58.18.1">
      <FullProductName ProductID="libfreebl3-3.40.1-58.18.1">libfreebl3-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.40.1-58.18.1">
      <FullProductName ProductID="libfreebl3-32bit-3.40.1-58.18.1">libfreebl3-32bit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.40.1-58.18.1">
      <FullProductName ProductID="libsoftokn3-3.40.1-58.18.1">libsoftokn3-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.40.1-58.18.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.40.1-58.18.1">libsoftokn3-32bit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-4.20-19.6.1">
      <FullProductName ProductID="mozilla-nspr-4.20-19.6.1">mozilla-nspr-4.20-19.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-32bit-4.20-19.6.1">
      <FullProductName ProductID="mozilla-nspr-32bit-4.20-19.6.1">mozilla-nspr-32bit-4.20-19.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-devel-4.20-19.6.1">
      <FullProductName ProductID="mozilla-nspr-devel-4.20-19.6.1">mozilla-nspr-devel-4.20-19.6.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-3.40.1-58.18.1">mozilla-nss-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.40.1-58.18.1">mozilla-nss-32bit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-certs-3.40.1-58.18.1">mozilla-nss-certs-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.40.1-58.18.1">mozilla-nss-certs-32bit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-devel-3.40.1-58.18.1">mozilla-nss-devel-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.40.1-58.18.1">mozilla-nss-sysinit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.40.1-58.18.1">mozilla-nss-sysinit-32bit-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.40.1-58.18.1">
      <FullProductName ProductID="mozilla-nss-tools-3.40.1-58.18.1">mozilla-nss-tools-3.40.1-58.18.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-60.4.0esr-109.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1">MozillaFirefox-60.4.0esr-109.55.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-60.4.0esr-109.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1">MozillaFirefox-devel-60.4.0esr-109.55.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-60.4.0esr-109.55.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1">MozillaFirefox-translations-common-60.4.0esr-109.55.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1">libfreebl3-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1">libfreebl3-32bit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1">libsoftokn3-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-32bit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1">libsoftokn3-32bit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-4.20-19.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1">mozilla-nspr-4.20-19.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-32bit-4.20-19.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1">mozilla-nspr-32bit-4.20-19.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-devel-4.20-19.6.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1">mozilla-nspr-devel-4.20-19.6.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1">mozilla-nss-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1">mozilla-nss-32bit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1">mozilla-nss-certs-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-32bit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1">mozilla-nss-certs-32bit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1">mozilla-nss-devel-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1">mozilla-nss-sysinit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-32bit-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1">mozilla-nss-sysinit-32bit-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.40.1-58.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1">mozilla-nss-tools-3.40.1-58.18.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.</Note>
    </Notes>
    <CVE>CVE-2018-0495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-0495.html</URL>
        <Description>CVE-2018-0495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1097410</URL>
        <Description>SUSE Bug 1097410</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When handling a SSLv2-compatible ClientHello request, the server doesn't generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.</Note>
    </Notes>
    <CVE>CVE-2018-12384</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12384.html</URL>
        <Description>CVE-2018-12384</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1106873</URL>
        <Description>SUSE Bug 1106873</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.</Note>
    </Notes>
    <CVE>CVE-2018-12404</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12404.html</URL>
        <Description>CVE-2018-12404</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119069</URL>
        <Description>SUSE Bug 1119069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 63 and Firefox ESR 60.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-12405</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-12405.html</URL>
        <Description>CVE-2018-12405</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.</Note>
    </Notes>
    <CVE>CVE-2018-17466</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-17466.html</URL>
        <Description>CVE-2018-17466</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability can occur after deleting a selection element due to a weak reference to the select element in the options collection. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18492.html</URL>
        <Description>CVE-2018-18492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow can occur in the Skia library during buffer offset calculations with hardware accelerated canvas 2D actions due to the use of 32-bit calculations instead of 64-bit. This results in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18493</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18493.html</URL>
        <Description>CVE-2018-18493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy violation allowing the theft of cross-origin URL entries when using the Javascript location property to cause a redirection to another site using performance.getEntries(). This is a same-origin policy violation and could allow for data theft. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18494</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18494.html</URL>
        <Description>CVE-2018-18494</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential vulnerability leading to an integer overflow can occur during buffer size calculations for images when a raw value is used instead of the checked value. This leads to a possible out-of-bounds write. This vulnerability affects Thunderbird &lt; 60.4, Firefox ESR &lt; 60.4, and Firefox &lt; 64.</Note>
    </Notes>
    <CVE>CVE-2018-18498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-devel-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-common-60.4.0esr-109.55.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libfreebl3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:libsoftokn3-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-32bit-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nspr-devel-4.20-19.6.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-certs-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-devel-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-sysinit-32bit-3.40.1-58.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:mozilla-nss-tools-3.40.1-58.18.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2018/suse-su-20184236-2/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2018-18498.html</URL>
        <Description>CVE-2018-18498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1112111</URL>
        <Description>SUSE Bug 1112111</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1119105</URL>
        <Description>SUSE Bug 1119105</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1121207</URL>
        <Description>SUSE Bug 1121207</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
