<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2368-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-24T14:50:42Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-24T14:50:42Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-24T14:50:42Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This update for MozillaFirefox and mozilla-nss fixes the following issues:

MozillaFirefox was updated to version 49.0 (boo#999701)
- New features
  * Updated Firefox Login Manager to allow HTTPS pages to use saved
    HTTP logins.
  * Added features to Reader Mode that make it easier on the eyes and
    the ears
  * Improved video performance for users on systems that support
    SSE3 without hardware acceleration
  * Added context menu controls to HTML5 audio and video that let users
    loops files or play files at 1.25x speed
  * Improvements in about:memory reports for tracking font memory usage
- Security related fixes
  * MFSA 2016-85
    CVE-2016-2827 (bmo#1289085) - Out-of-bounds read in
    mozilla::net::IsValidReferrerPolicy
    CVE-2016-5270 (bmo#1291016) - Heap-buffer-overflow in
    nsCaseTransformTextRunFactory::TransformString
    CVE-2016-5271 (bmo#1288946) - Out-of-bounds read in
    PropertyProvider::GetSpacingInternal
    CVE-2016-5272 (bmo#1297934) - Bad cast in nsImageGeometryMixin
    CVE-2016-5273 (bmo#1280387) - crash in
    mozilla::a11y::HyperTextAccessible::GetChildOffset
    CVE-2016-5276 (bmo#1287721) - Heap-use-after-free in
    mozilla::a11y::DocAccessible::ProcessInvalidationList
    CVE-2016-5274 (bmo#1282076) - use-after-free in
    nsFrameManager::CaptureFrameState
    CVE-2016-5277 (bmo#1291665) - Heap-use-after-free in nsRefreshDriver::Tick
    CVE-2016-5275 (bmo#1287316) - global-buffer-overflow in
    mozilla::gfx::FilterSupport::ComputeSourceNeededRegions
    CVE-2016-5278 (bmo#1294677) - Heap-buffer-overflow in
    nsBMPEncoder::AddImageFrame
    CVE-2016-5279 (bmo#1249522) - Full local path of files is available
    to web pages after drag and drop
    CVE-2016-5280 (bmo#1289970) - Use-after-free in
    mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
    CVE-2016-5281 (bmo#1284690) - use-after-free in DOMSVGLength
    CVE-2016-5282 (bmo#932335) - Don't allow content to request favicons
    from non-whitelisted schemes
    CVE-2016-5283 (bmo#928187) - &lt;iframe src&gt; fragment timing attack can
    reveal cross-origin data
    CVE-2016-5284 (bmo#1303127) - Add-on update site certificate pin expiration
    CVE-2016-5256 - Memory safety bugs fixed in Firefox 49
    CVE-2016-5257 - Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
- requires NSS 3.25

- Mozilla Firefox 48.0.2:
  * Mitigate a startup crash issue caused on Windows (bmo#1291738)

mozilla-nss was updated to NSS 3.25.
  New functionality:
  * Implemented DHE key agreement for TLS 1.3
  * Added support for ChaCha with TLS 1.3
  * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
  * In previous versions, when using client authentication with TLS 1.2,
    NSS only supported certificate_verify messages that used the same
    signature hash algorithm as used by the PRF. This limitation has
    been removed.
  * Several functions have been added to the public API of the
    NSS Cryptoki Framework.
  New functions:
  * NSSCKFWSlot_GetSlotID
  * NSSCKFWSession_GetFWSlot
  * NSSCKFWInstance_DestroySessionHandle
  * NSSCKFWInstance_FindSessionHandle
  Notable changes:
  * An SSL socket can no longer be configured to allow both TLS 1.3 and SSLv3
  * Regression fix: NSS no longer reports a failure if an application
    attempts to disable the SSLv2 protocol.
  * The list of trusted CA certificates has been updated to version 2.8
  * The following CA certificate was Removed
    Sonera Class1 CA
  * The following CA certificates were Added
    Hellenic Academic and Research Institutions RootCA 2015
    Hellenic Academic and Research Institutions ECC RootCA 2015
    Certplus Root CA G1
    Certplus Root CA G2
    OpenTrust Root CA G1
    OpenTrust Root CA G2
    OpenTrust Root CA G3
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2368-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-49.0-33.1">MozillaFirefox-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-49.0-33.1">MozillaFirefox-branding-upstream-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-49.0-33.1">MozillaFirefox-buildsymbols-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-devel-49.0-33.1">MozillaFirefox-devel-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-49.0-33.1">MozillaFirefox-translations-common-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-49.0-33.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-49.0-33.1">MozillaFirefox-translations-other-49.0-33.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.25-29.1">
      <FullProductName ProductID="libfreebl3-3.25-29.1">libfreebl3-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.25-29.1">
      <FullProductName ProductID="libfreebl3-32bit-3.25-29.1">libfreebl3-32bit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.25-29.1">
      <FullProductName ProductID="libsoftokn3-3.25-29.1">libsoftokn3-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.25-29.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.25-29.1">libsoftokn3-32bit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-3.25-29.1">mozilla-nss-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.25-29.1">mozilla-nss-32bit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-certs-3.25-29.1">mozilla-nss-certs-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.25-29.1">mozilla-nss-certs-32bit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-devel-3.25-29.1">mozilla-nss-devel-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.25-29.1">mozilla-nss-sysinit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.25-29.1">mozilla-nss-sysinit-32bit-3.25-29.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.25-29.1">
      <FullProductName ProductID="mozilla-nss-tools-3.25-29.1">mozilla-nss-tools-3.25-29.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-49.0-33.1">MozillaFirefox-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1">MozillaFirefox-branding-upstream-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1">MozillaFirefox-buildsymbols-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1">MozillaFirefox-devel-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1">MozillaFirefox-translations-common-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-49.0-33.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1">MozillaFirefox-translations-other-49.0-33.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-3.25-29.1">libfreebl3-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1">libfreebl3-32bit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-3.25-29.1">libsoftokn3-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-32bit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1">libsoftokn3-32bit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-3.25-29.1">mozilla-nss-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1">mozilla-nss-32bit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1">mozilla-nss-certs-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-32bit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1">mozilla-nss-certs-32bit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1">mozilla-nss-devel-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1">mozilla-nss-sysinit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-32bit-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1">mozilla-nss-sysinit-32bit-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.25-29.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1">mozilla-nss-tools-3.25-29.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.</Note>
    </Notes>
    <CVE>CVE-2016-2827</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2827.html</URL>
        <Description>CVE-2016-2827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5256</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5256.html</URL>
        <Description>CVE-2016-5256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5257</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5257.html</URL>
        <Description>CVE-2016-5257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.</Note>
    </Notes>
    <CVE>CVE-2016-5270</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5270.html</URL>
        <Description>CVE-2016-5270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.</Note>
    </Notes>
    <CVE>CVE-2016-5271</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5271.html</URL>
        <Description>CVE-2016-5271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5272</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5272.html</URL>
        <Description>CVE-2016-5272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5273</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5273.html</URL>
        <Description>CVE-2016-5273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.</Note>
    </Notes>
    <CVE>CVE-2016-5274</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5274.html</URL>
        <Description>CVE-2016-5274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.</Note>
    </Notes>
    <CVE>CVE-2016-5275</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5275.html</URL>
        <Description>CVE-2016-5275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.</Note>
    </Notes>
    <CVE>CVE-2016-5276</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5276.html</URL>
        <Description>CVE-2016-5276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.</Note>
    </Notes>
    <CVE>CVE-2016-5277</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5277.html</URL>
        <Description>CVE-2016-5277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.</Note>
    </Notes>
    <CVE>CVE-2016-5278</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5278.html</URL>
        <Description>CVE-2016-5278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5279</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5279.html</URL>
        <Description>CVE-2016-5279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.</Note>
    </Notes>
    <CVE>CVE-2016-5280</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5280.html</URL>
        <Description>CVE-2016-5280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.</Note>
    </Notes>
    <CVE>CVE-2016-5281</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5281.html</URL>
        <Description>CVE-2016-5281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.</Note>
    </Notes>
    <CVE>CVE-2016-5282</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5282.html</URL>
        <Description>CVE-2016-5282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.</Note>
    </Notes>
    <CVE>CVE-2016-5283</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5283.html</URL>
        <Description>CVE-2016-5283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2016-5284</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-49.0-33.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.25-29.1</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.25-29.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00019.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5284.html</URL>
        <Description>CVE-2016-5284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
