<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:3105-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-13T08:18:24Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-13T08:18:24Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-13T08:18:24Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox, mozilla-nss fixes security issues and bugs.

The following vulnerabilities were fixed in Firefox ESR 45.5.1 (bsc#1009026):

- CVE-2016-9079: Use-after-free in SVG Animation (bsc#1012964 MFSA 2016-92)
- CVE-2016-5297: Incorrect argument length checking in Javascript (bsc#1010401)
- CVE-2016-9066: Integer overflow leading to a buffer overflow in nsScriptLoadHandler (bsc#1010404)
- CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1 (bsc#1010395)
- CVE-2016-9064: Addons update must verify IDs match between current and new versions (bsc#1010402)
- CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR 45.5 (bsc#1010427)
- CVE-2016-5291: Same-origin policy violation using local HTML file and saved shortcut file (bsc#1010410)

The following vulnerabilities were fixed in mozilla-nss 3.21.3:

- CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler (bsc#1010422)
- CVE-2016-5285: Missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime causes server crash (bsc#1010517)

The following bugs were fixed:

- Firefox would fail to go into fullscreen mode with some window managers (bsc#992549)
- font warning messages would flood console, now using fontconfig configuration from
  firefox-fontconfig instead of the system one (bsc#1000751)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp2-mfs2016-90-12883</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      <Description>Link for SUSE-SU-2016:3105-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00049.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:3105-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000751</URL>
      <Description>SUSE Bug 1000751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1009026</URL>
      <Description>SUSE Bug 1009026</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010395</URL>
      <Description>SUSE Bug 1010395</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010401</URL>
      <Description>SUSE Bug 1010401</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010402</URL>
      <Description>SUSE Bug 1010402</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010404</URL>
      <Description>SUSE Bug 1010404</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010410</URL>
      <Description>SUSE Bug 1010410</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010422</URL>
      <Description>SUSE Bug 1010422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010427</URL>
      <Description>SUSE Bug 1010427</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1010517</URL>
      <Description>SUSE Bug 1010517</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1012964</URL>
      <Description>SUSE Bug 1012964</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/992549</URL>
      <Description>SUSE Bug 992549</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5285/</URL>
      <Description>SUSE CVE CVE-2016-5285 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5290/</URL>
      <Description>SUSE CVE CVE-2016-5290 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5291/</URL>
      <Description>SUSE CVE CVE-2016-5291 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5296/</URL>
      <Description>SUSE CVE CVE-2016-5296 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5297/</URL>
      <Description>SUSE CVE CVE-2016-5297 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9064/</URL>
      <Description>SUSE CVE CVE-2016-9064 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9066/</URL>
      <Description>SUSE CVE CVE-2016-9066 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9074/</URL>
      <Description>SUSE CVE CVE-2016-9074 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9079/</URL>
      <Description>SUSE CVE CVE-2016-9079 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-45.5.1esr-63.1">
      <FullProductName ProductID="MozillaFirefox-45.5.1esr-63.1">MozillaFirefox-45.5.1esr-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-45.5.1esr-63.1">
      <FullProductName ProductID="MozillaFirefox-translations-45.5.1esr-63.1">MozillaFirefox-translations-45.5.1esr-63.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.21.3-30.1">
      <FullProductName ProductID="libfreebl3-3.21.3-30.1">libfreebl3-3.21.3-30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.21.3-30.1">
      <FullProductName ProductID="libfreebl3-32bit-3.21.3-30.1">libfreebl3-32bit-3.21.3-30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.21.3-30.1">
      <FullProductName ProductID="mozilla-nss-3.21.3-30.1">mozilla-nss-3.21.3-30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.21.3-30.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.21.3-30.1">mozilla-nss-32bit-3.21.3-30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.21.3-30.1">
      <FullProductName ProductID="mozilla-nss-devel-3.21.3-30.1">mozilla-nss-devel-3.21.3-30.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.21.3-30.1">
      <FullProductName ProductID="mozilla-nss-tools-3.21.3-30.1">mozilla-nss-tools-3.21.3-30.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-45.5.1esr-63.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1">MozillaFirefox-45.5.1esr-63.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.5.1esr-63.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1">MozillaFirefox-translations-45.5.1esr-63.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1">libfreebl3-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1">libfreebl3-32bit-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1">mozilla-nss-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1">mozilla-nss-32bit-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1">mozilla-nss-devel-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.21.3-30.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1">mozilla-nss-tools-3.21.3-30.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A Null pointer dereference vulnerability exists in Mozilla Network Security Services due to a missing NULL check in PK11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime, which could let a remote malicious user cause a Denial of Service.</Note>
    </Notes>
    <CVE>CVE-2016-5285</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5285.html</URL>
        <Description>CVE-2016-5285</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010517</URL>
        <Description>SUSE Bug 1010517</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5290</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5290.html</URL>
        <Description>CVE-2016-5290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010427</URL>
        <Description>SUSE Bug 1010427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5291</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5291.html</URL>
        <Description>CVE-2016-5291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010410</URL>
        <Description>SUSE Bug 1010410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5296</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5296.html</URL>
        <Description>CVE-2016-5296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010395</URL>
        <Description>SUSE Bug 1010395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5297</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5297.html</URL>
        <Description>CVE-2016-5297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010401</URL>
        <Description>SUSE Bug 1010401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9064</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9064.html</URL>
        <Description>CVE-2016-9064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010402</URL>
        <Description>SUSE Bug 1010402</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9066</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9066.html</URL>
        <Description>CVE-2016-9066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010404</URL>
        <Description>SUSE Bug 1010404</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9074</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9074.html</URL>
        <Description>CVE-2016-9074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010422</URL>
        <Description>SUSE Bug 1010422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.</Note>
    </Notes>
    <CVE>CVE-2016-9079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-45.5.1esr-63.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.21.3-30.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.21.3-30.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163105-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9079.html</URL>
        <Description>CVE-2016-9079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012964</URL>
        <Description>SUSE Bug 1012964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
