<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:3210-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-21T15:25:59Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-21T15:25:59Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-21T15:25:59Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MozillaFirefox 45 ESR was updated to 45.6 to fix the following issues:

* MFSA 2016-95/CVE-2016-9897: Memory corruption in libGLES
* MFSA 2016-95/CVE-2016-9901: Data from Pocket server improperly sanitized before execution
* MFSA 2016-95/CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
* MFSA 2016-95/CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
* MFSA 2016-95/CVE-2016-9904: Cross-origin information leak in shared atoms
* MFSA 2016-95/CVE-2016-9905: Crash in EnumerateSubDocuments
* MFSA 2016-95/CVE-2016-9895: CSP bypass using marquee tag
* MFSA 2016-95/CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
* MFSA 2016-95/CVE-2016-9893: Memory safety bugs fixed in Firefox 50.1 and Firefox ESR 45.6
* MFSA 2016-95/CVE-2016-9902: Pocket extension does not validate the origin of events

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2016-95/
for more information.

Also the following bug was fixed:
- Fix fontconfig issue (bsc#1000751) on 32bit systems as well.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-MozillaFirefox-12903,sleclo50sp3-MozillaFirefox-12903,sleman21-MozillaFirefox-12903,slemap21-MozillaFirefox-12903,sleposp3-MozillaFirefox-12903,slessp3-MozillaFirefox-12903,slessp4-MozillaFirefox-12903</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      <Description>Link for SUSE-SU-2016:3210-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00080.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:3210-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1000751</URL>
      <Description>SUSE Bug 1000751</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015422</URL>
      <Description>SUSE Bug 1015422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9893/</URL>
      <Description>SUSE CVE CVE-2016-9893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9895/</URL>
      <Description>SUSE CVE CVE-2016-9895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9897/</URL>
      <Description>SUSE CVE CVE-2016-9897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9898/</URL>
      <Description>SUSE CVE CVE-2016-9898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9899/</URL>
      <Description>SUSE CVE CVE-2016-9899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9900/</URL>
      <Description>SUSE CVE CVE-2016-9900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9901/</URL>
      <Description>SUSE CVE CVE-2016-9901 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9902/</URL>
      <Description>SUSE CVE CVE-2016-9902 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9904/</URL>
      <Description>SUSE CVE CVE-2016-9904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9905/</URL>
      <Description>SUSE CVE CVE-2016-9905 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp3">SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager 2.1">
      <Branch Type="Product Name" Name="SUSE Manager 2.1">
        <FullProductName ProductID="SUSE Manager 2.1" CPE="cpe:/o:suse:suse-manager-server:2.1">SUSE Manager 2.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 2.1">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 2.1">
        <FullProductName ProductID="SUSE Manager Proxy 2.1">SUSE Manager Proxy 2.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 5">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 5">
        <FullProductName ProductID="SUSE OpenStack Cloud 5" CPE="cpe:/o:suse:cloud:5">SUSE OpenStack Cloud 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-45.6.0esr-62.1">
      <FullProductName ProductID="MozillaFirefox-devel-45.6.0esr-62.1">MozillaFirefox-devel-45.6.0esr-62.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-45.6.0esr-62.1">
      <FullProductName ProductID="MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-45.6.0esr-62.1">
      <FullProductName ProductID="MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1">MozillaFirefox-devel-45.6.0esr-62.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 2.1">
      <FullProductName ProductID="SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Manager 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 2.1">
      <FullProductName ProductID="SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Manager 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 2.1">
      <FullProductName ProductID="SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE Manager Proxy 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 2.1">
      <FullProductName ProductID="SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE Manager Proxy 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 5">
      <FullProductName ProductID="SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1">MozillaFirefox-45.6.0esr-62.1 as a component of SUSE OpenStack Cloud 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.6.0esr-62.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 5">
      <FullProductName ProductID="SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1">MozillaFirefox-translations-45.6.0esr-62.1 as a component of SUSE OpenStack Cloud 5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9893.html</URL>
        <Description>CVE-2016-9893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9895.html</URL>
        <Description>CVE-2016-9895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9897.html</URL>
        <Description>CVE-2016-9897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9898.html</URL>
        <Description>CVE-2016-9898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9899.html</URL>
        <Description>CVE-2016-9899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9900.html</URL>
        <Description>CVE-2016-9900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">HTML tags received from the Pocket server will be processed without sanitization and any JavaScript code executed will be run in the "about:pocket-saved" (unprivileged) page, giving it access to Pocket's messaging API through HTML injection. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.</Note>
    </Notes>
    <CVE>CVE-2016-9901</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9901.html</URL>
        <Description>CVE-2016-9901</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Pocket toolbar button, once activated, listens for events fired from it's own pages but does not verify the origin of incoming events. This allows content from other origins to fire events and inject content and commands into the Pocket context. Note: this issue does not affect users with e10s enabled. This vulnerability affects Firefox ESR &lt; 45.6 and Firefox &lt; 50.1.</Note>
    </Notes>
    <CVE>CVE-2016-9902</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9902.html</URL>
        <Description>CVE-2016-9902</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9904.html</URL>
        <Description>CVE-2016-9904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.6.0esr-62.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.6.0esr-62.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20163210-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9905.html</URL>
        <Description>CVE-2016-9905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
