<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:0584-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-25T15:19:11Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-25T15:19:11Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-25T15:19:11Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, MozillaFirefox-branding-SLED, MozillaFirefox-branding-SLES-for-VMware, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nss fixes the following issues: 

Firefox 38.6.1 ESR (bsc#967087)

The following vulnerabilities were fixed:

- CVE-2016-1523: Fixed denial of service in Graphite 2 library (MFSA 2016-14/bmo#1246093)

Firefox 38.6.0 ESR + Mozilla NSS 3.20.2. (bsc#963520)

The following vulnerabilities were fixed:

- CVE-2016-1930: Memory safety bugs fixed in Firefox ESR 38.6 (bsc#963632)
- CVE-2016-1935: Buffer overflow in WebGL after out of memory allocation (bsc#963635)
- CVE-2016-1938: Calculations with mp_div and mp_exptmod in Network Security Services (NSS) canproduce wrong results (bsc#963731)
- CVE-2015-7575: MD5 signatures accepted within TLS 1.2 ServerKeyExchange in server signature (bsc#959888)

The following improvements were added:

- bsc#954447: Mozilla NSS now supports a number of new DHE ciphersuites
- Tracking protection is now enabled by default
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp2-mozilla-12419</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      <Description>Link for SUSE-SU-2016:0584-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-February/001894.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:0584-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/954447</URL>
      <Description>SUSE Bug 954447</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/959888</URL>
      <Description>SUSE Bug 959888</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963520</URL>
      <Description>SUSE Bug 963520</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963632</URL>
      <Description>SUSE Bug 963632</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963635</URL>
      <Description>SUSE Bug 963635</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/963731</URL>
      <Description>SUSE Bug 963731</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/967087</URL>
      <Description>SUSE Bug 967087</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7575/</URL>
      <Description>SUSE CVE CVE-2015-7575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1523/</URL>
      <Description>SUSE CVE CVE-2016-1523 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1930/</URL>
      <Description>SUSE CVE CVE-2016-1930 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1935/</URL>
      <Description>SUSE CVE CVE-2016-1935 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1938/</URL>
      <Description>SUSE CVE CVE-2016-1938 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-38.6.1esr-33.1">
      <FullProductName ProductID="MozillaFirefox-38.6.1esr-33.1">MozillaFirefox-38.6.1esr-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-SLED-38-15.58">
      <FullProductName ProductID="MozillaFirefox-branding-SLED-38-15.58">MozillaFirefox-branding-SLED-38-15.58</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-38.6.1esr-33.1">
      <FullProductName ProductID="MozillaFirefox-translations-38.6.1esr-33.1">MozillaFirefox-translations-38.6.1esr-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.20.2-17.5">
      <FullProductName ProductID="libfreebl3-3.20.2-17.5">libfreebl3-3.20.2-17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.20.2-17.5">
      <FullProductName ProductID="libfreebl3-32bit-3.20.2-17.5">libfreebl3-32bit-3.20.2-17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.20.2-17.5">
      <FullProductName ProductID="mozilla-nss-3.20.2-17.5">mozilla-nss-3.20.2-17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.20.2-17.5">
      <FullProductName ProductID="mozilla-nss-32bit-3.20.2-17.5">mozilla-nss-32bit-3.20.2-17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.20.2-17.5">
      <FullProductName ProductID="mozilla-nss-devel-3.20.2-17.5">mozilla-nss-devel-3.20.2-17.5</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.20.2-17.5">
      <FullProductName ProductID="mozilla-nss-tools-3.20.2-17.5">mozilla-nss-tools-3.20.2-17.5</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-38.6.1esr-33.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1">MozillaFirefox-38.6.1esr-33.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-SLED-38-15.58" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58">MozillaFirefox-branding-SLED-38-15.58 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-38.6.1esr-33.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1">MozillaFirefox-translations-38.6.1esr-33.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5">libfreebl3-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5">libfreebl3-32bit-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5">mozilla-nss-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5">mozilla-nss-32bit-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5">mozilla-nss-devel-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.20.2-17.5" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5">mozilla-nss-tools-3.20.2-17.5 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</Note>
    </Notes>
    <CVE>CVE-2015-7575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7575.html</URL>
        <Description>CVE-2015-7575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959888</URL>
        <Description>SUSE Bug 959888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960996</URL>
        <Description>SUSE Bug 960996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961280</URL>
        <Description>SUSE Bug 961280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961281</URL>
        <Description>SUSE Bug 961281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961282</URL>
        <Description>SUSE Bug 961282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961283</URL>
        <Description>SUSE Bug 961283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961284</URL>
        <Description>SUSE Bug 961284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961290</URL>
        <Description>SUSE Bug 961290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961357</URL>
        <Description>SUSE Bug 961357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967521</URL>
        <Description>SUSE Bug 967521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981087</URL>
        <Description>SUSE Bug 981087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.</Note>
    </Notes>
    <CVE>CVE-2016-1523</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1523.html</URL>
        <Description>CVE-2016-1523</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965803</URL>
        <Description>SUSE Bug 965803</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965806</URL>
        <Description>SUSE Bug 965806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965807</URL>
        <Description>SUSE Bug 965807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/965810</URL>
        <Description>SUSE Bug 965810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967087</URL>
        <Description>SUSE Bug 967087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1930.html</URL>
        <Description>CVE-2016-1930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963632</URL>
        <Description>SUSE Bug 963632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.</Note>
    </Notes>
    <CVE>CVE-2016-1935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1935.html</URL>
        <Description>CVE-2016-1935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963635</URL>
        <Description>SUSE Bug 963635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.</Note>
    </Notes>
    <CVE>CVE-2016-1938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-15.58</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.6.1esr-33.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.20.2-17.5</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.20.2-17.5</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20160584-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1938.html</URL>
        <Description>CVE-2016-1938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963731</URL>
        <Description>SUSE Bug 963731</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
