<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for the MozillaFirefox, mozilla-nss and mozilla-nspr</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:0309-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-02-01T21:22:10Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-02-01T21:22:10Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-02-01T21:22:10Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for the MozillaFirefox, mozilla-nss and mozilla-nspr</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to MozillaFirefox fixes several security issues and bugs.

Mozilla Firefox was updated to 44.0.
Mozilla NSS was updated to 3.21
Mozilla NSPR was updated to 4.11.

The following vulnerabilities were fixed:

* CVE-2016-1930/CVE-2016-1931: Miscellaneous memory safety hazards (boo#963633)
* CVE-2016-1933: Out of Memory crash when parsing GIF format images (boo#963634)
* CVE-2016-1935:  Buffer overflow in WebGL after out of memory allocation (boo#963635)
* CVE-2015-7208/CVE-2016-1939: Firefox allows for control characters to be set in cookie names (boo#963637)
* CVE-2016-1937: Missing delay following user click events in protocol handler dialog (boo#963641)
* CVE-2016-1938: Errors in mp_div and mp_exptmod cryptographic functions in NSS (boo#963731)
* CVE-2016-1942/CVE-2016-1943: Addressbar spoofing attacks (boo#963643)
* CVE-2016-1944/CVE-2016-1945/CVE-2016-1946: Unsafe memory manipulation found through code inspection (boo#963644)
* CVE-2016-1947: Application Reputation service disabled in Firefox 43 (boo#963645)

The following change from Mozilla Firefox 43.0.4 is included:

* Re-enable SHA-1 certificates to prevent outdated man-in-the-middle security devices from interfering with properly secured SSL/TLS connections</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:0309-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-44.0-12.2">MozillaFirefox-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-44.0-12.2">MozillaFirefox-branding-upstream-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-44.0-12.2">MozillaFirefox-buildsymbols-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-devel-44.0-12.2">MozillaFirefox-devel-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-44.0-12.2">MozillaFirefox-translations-common-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-44.0-12.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-44.0-12.2">MozillaFirefox-translations-other-44.0-12.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.21-9.1">
      <FullProductName ProductID="libfreebl3-3.21-9.1">libfreebl3-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.21-9.1">
      <FullProductName ProductID="libfreebl3-32bit-3.21-9.1">libfreebl3-32bit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.21-9.1">
      <FullProductName ProductID="libsoftokn3-3.21-9.1">libsoftokn3-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.21-9.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.21-9.1">libsoftokn3-32bit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-4.11-7.1">
      <FullProductName ProductID="mozilla-nspr-4.11-7.1">mozilla-nspr-4.11-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-32bit-4.11-7.1">
      <FullProductName ProductID="mozilla-nspr-32bit-4.11-7.1">mozilla-nspr-32bit-4.11-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-devel-4.11-7.1">
      <FullProductName ProductID="mozilla-nspr-devel-4.11-7.1">mozilla-nspr-devel-4.11-7.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-3.21-9.1">mozilla-nss-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.21-9.1">mozilla-nss-32bit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-certs-3.21-9.1">mozilla-nss-certs-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.21-9.1">mozilla-nss-certs-32bit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-devel-3.21-9.1">mozilla-nss-devel-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.21-9.1">mozilla-nss-sysinit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.21-9.1">mozilla-nss-sysinit-32bit-3.21-9.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.21-9.1">
      <FullProductName ProductID="mozilla-nss-tools-3.21-9.1">mozilla-nss-tools-3.21-9.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-44.0-12.2">MozillaFirefox-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2">MozillaFirefox-branding-upstream-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2">MozillaFirefox-buildsymbols-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2">MozillaFirefox-devel-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2">MozillaFirefox-translations-common-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-44.0-12.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2">MozillaFirefox-translations-other-44.0-12.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-3.21-9.1">libfreebl3-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1">libfreebl3-32bit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-3.21-9.1">libsoftokn3-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-32bit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1">libsoftokn3-32bit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-4.11-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nspr-4.11-7.1">mozilla-nspr-4.11-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-32bit-4.11-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1">mozilla-nspr-32bit-4.11-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-devel-4.11-7.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1">mozilla-nspr-devel-4.11-7.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-3.21-9.1">mozilla-nss-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1">mozilla-nss-32bit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1">mozilla-nss-certs-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-32bit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1">mozilla-nss-certs-32bit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1">mozilla-nss-devel-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1">mozilla-nss-sysinit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-32bit-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1">mozilla-nss-sysinit-32bit-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.21-9.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1">mozilla-nss-tools-3.21-9.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 43.0 stores cookies containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.</Note>
    </Notes>
    <CVE>CVE-2015-7208</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7208.html</URL>
        <Description>CVE-2015-7208</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959277</URL>
        <Description>SUSE Bug 959277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963637</URL>
        <Description>SUSE Bug 963637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1930</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1930.html</URL>
        <Description>CVE-2016-1930</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963632</URL>
        <Description>SUSE Bug 963632</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1931</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1931.html</URL>
        <Description>CVE-2016-1931</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963633</URL>
        <Description>SUSE Bug 963633</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.</Note>
    </Notes>
    <CVE>CVE-2016-1933</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1933.html</URL>
        <Description>CVE-2016-1933</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963634</URL>
        <Description>SUSE Bug 963634</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.</Note>
    </Notes>
    <CVE>CVE-2016-1935</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1935.html</URL>
        <Description>CVE-2016-1935</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963520</URL>
        <Description>SUSE Bug 963520</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963635</URL>
        <Description>SUSE Bug 963635</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.</Note>
    </Notes>
    <CVE>CVE-2016-1937</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1937.html</URL>
        <Description>CVE-2016-1937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963641</URL>
        <Description>SUSE Bug 963641</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977736</URL>
        <Description>SUSE Bug 977736</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The s_mp_div function in lib/freebl/mpi/mpi.c in Mozilla Network Security Services (NSS) before 3.21, as used in Mozilla Firefox before 44.0, improperly divides numbers, which might make it easier for remote attackers to defeat cryptographic protection mechanisms by leveraging use of the (1) mp_div or (2) mp_exptmod function.</Note>
    </Notes>
    <CVE>CVE-2016-1938</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1938.html</URL>
        <Description>CVE-2016-1938</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963731</URL>
        <Description>SUSE Bug 963731</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.</Note>
    </Notes>
    <CVE>CVE-2016-1939</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1939.html</URL>
        <Description>CVE-2016-1939</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963637</URL>
        <Description>SUSE Bug 963637</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.</Note>
    </Notes>
    <CVE>CVE-2016-1942</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1942.html</URL>
        <Description>CVE-2016-1942</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963643</URL>
        <Description>SUSE Bug 963643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 44.0 on Android allows remote attackers to spoof the address bar via the scrollTo method.</Note>
    </Notes>
    <CVE>CVE-2016-1943</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1943.html</URL>
        <Description>CVE-2016-1943</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963643</URL>
        <Description>SUSE Bug 963643</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-1944</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1944.html</URL>
        <Description>CVE-2016-1944</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2016-1945</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1945.html</URL>
        <Description>CVE-2016-1945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.</Note>
    </Notes>
    <CVE>CVE-2016-1946</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1946.html</URL>
        <Description>CVE-2016-1946</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963644</URL>
        <Description>SUSE Bug 963644</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.</Note>
    </Notes>
    <CVE>CVE-2016-1947</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-44.0-12.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-32bit-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nspr-devel-4.11-7.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.21-9.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.21-9.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-02/msg00002.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1947.html</URL>
        <Description>CVE-2016-1947</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963645</URL>
        <Description>SUSE Bug 963645</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
