<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Update to Firefox 31.7.0esr</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0892-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-05-18T06:51:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-05-18T06:51:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-05-18T06:51:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Update to Firefox 31.7.0esr</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">- update to Firefox 31.7.0esr (bnc#930622)
  * MFSA 2015-46/CVE-2015-2708
    Miscellaneous memory safety hazards
  * MFSA 2015-47/VE-2015-0797 (bmo#1080995)
    Buffer overflow parsing H.264 video with Linux Gstreamer
  * MFSA 2015-48/CVE-2015-2710 (bmo#1149542)
    Buffer overflow with SVG content and CSS
  * MFSA 2015-51/CVE-2015-2713 (bmo#1153478)
    Use-after-free during text processing with vertical text enabled
  * MFSA 2015-54/CVE-2015-2716 (bmo#1140537)
    Buffer overflow when parsing compressed XML
  * MFSA 2015-57/CVE-2011-3079 (bmo#1087565)
    Privilege escalation through IPC channel messages
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0892-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Evergreen 11.4">
      <Branch Type="Product Name" Name="openSUSE Evergreen 11.4">
        <FullProductName ProductID="openSUSE Evergreen 11.4">openSUSE Evergreen 11.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-31.7.0-140.1">MozillaFirefox-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-31.7.0-140.1">MozillaFirefox-branding-upstream-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-31.7.0-140.1">MozillaFirefox-buildsymbols-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-debuginfo-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-debuginfo-31.7.0-140.1">MozillaFirefox-debuginfo-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-debugsource-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-debugsource-31.7.0-140.1">MozillaFirefox-debugsource-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-devel-31.7.0-140.1">MozillaFirefox-devel-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-31.7.0-140.1">MozillaFirefox-translations-common-31.7.0-140.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-31.7.0-140.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-31.7.0-140.1">MozillaFirefox-translations-other-31.7.0-140.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1">MozillaFirefox-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1">MozillaFirefox-branding-upstream-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1">MozillaFirefox-buildsymbols-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-debuginfo-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1">MozillaFirefox-debuginfo-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-debugsource-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1">MozillaFirefox-debugsource-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1">MozillaFirefox-devel-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1">MozillaFirefox-translations-common-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-31.7.0-140.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Evergreen 11.4">
      <FullProductName ProductID="openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1">MozillaFirefox-translations-other-31.7.0-140.1 as a component of openSUSE Evergreen 11.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.</Note>
    </Notes>
    <CVE>CVE-2011-3079</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3079.html</URL>
        <Description>CVE-2011-3079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/760264</URL>
        <Description>SUSE Bug 760264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.</Note>
    </Notes>
    <CVE>CVE-2015-0801</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0801.html</URL>
        <Description>CVE-2015-0801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925368</URL>
        <Description>SUSE Bug 925368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925401</URL>
        <Description>SUSE Bug 925401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.</Note>
    </Notes>
    <CVE>CVE-2015-0807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0807.html</URL>
        <Description>CVE-2015-0807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/913068</URL>
        <Description>SUSE Bug 913068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925368</URL>
        <Description>SUSE Bug 925368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925398</URL>
        <Description>SUSE Bug 925398</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the AppendElements function in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 on Linux, when the Fluendo MP3 plugin for GStreamer is used, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a crafted MP3 file.</Note>
    </Notes>
    <CVE>CVE-2015-0813</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0813.html</URL>
        <Description>CVE-2015-0813</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925368</URL>
        <Description>SUSE Bug 925368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925393</URL>
        <Description>SUSE Bug 925393</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-0815</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0815.html</URL>
        <Description>CVE-2015-0815</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925368</URL>
        <Description>SUSE Bug 925368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925392</URL>
        <Description>SUSE Bug 925392</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.</Note>
    </Notes>
    <CVE>CVE-2015-0816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-0816.html</URL>
        <Description>CVE-2015-0816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925368</URL>
        <Description>SUSE Bug 925368</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/925395</URL>
        <Description>SUSE Bug 925395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2708</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2708.html</URL>
        <Description>CVE-2015-2708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.</Note>
    </Notes>
    <CVE>CVE-2015-2710</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2710.html</URL>
        <Description>CVE-2015-2710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.</Note>
    </Notes>
    <CVE>CVE-2015-2713</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2713.html</URL>
        <Description>CVE-2015-2713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.</Note>
    </Notes>
    <CVE>CVE-2015-2716</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-branding-upstream-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-buildsymbols-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debuginfo-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-debugsource-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-devel-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-common-31.7.0-140.1</ProductID>
        <ProductID>openSUSE Evergreen 11.4:MozillaFirefox-translations-other-31.7.0-140.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2716.html</URL>
        <Description>CVE-2015-2716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980391</URL>
        <Description>SUSE Bug 980391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983985</URL>
        <Description>SUSE Bug 983985</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
