<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2386-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-09-26T12:57:34Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-09-26T12:57:34Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-09-26T12:57:34Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">MozillaFirefox was updated to version 49.0 (boo#999701)
   - New features
     * Updated Firefox Login Manager to allow HTTPS pages to use saved HTTP
       logins.
     * Added features to Reader Mode that make it easier on the eyes and the
       ears
     * Improved video performance for users on systems that support SSE3
       without hardware acceleration
     * Added context menu controls to HTML5 audio and video that let users
       loops files or play files at 1.25x speed
     * Improvements in about:memory reports for tracking font memory usage
   - Security related fixes
     * MFSA 2016-85 CVE-2016-2827 (bmo#1289085) - Out-of-bounds read in
       mozilla::net::IsValidReferrerPolicy CVE-2016-5270 (bmo#1291016) -
       Heap-buffer-overflow in nsCaseTransformTextRunFactory::TransformString
       CVE-2016-5271 (bmo#1288946) - Out-of-bounds read in
       PropertyProvider::GetSpacingInternal CVE-2016-5272 (bmo#1297934) - Bad
       cast in nsImageGeometryMixin CVE-2016-5273 (bmo#1280387) - crash in
       mozilla::a11y::HyperTextAccessible::GetChildOffset CVE-2016-5276
       (bmo#1287721) - Heap-use-after-free in
       mozilla::a11y::DocAccessible::ProcessInvalidationList CVE-2016-5274
       (bmo#1282076) - use-after-free in nsFrameManager::CaptureFrameState
       CVE-2016-5277 (bmo#1291665) - Heap-use-after-free in
       nsRefreshDriver::Tick CVE-2016-5275 (bmo#1287316) -
       global-buffer-overflow in
       mozilla::gfx::FilterSupport::ComputeSourceNeededRegions CVE-2016-5278
       (bmo#1294677) - Heap-buffer-overflow in nsBMPEncoder::AddImageFrame
       CVE-2016-5279 (bmo#1249522) - Full local path of files is available to
       web pages after drag and drop CVE-2016-5280 (bmo#1289970) -
       Use-after-free in
       mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap
       CVE-2016-5281 (bmo#1284690) - use-after-free in DOMSVGLength
       CVE-2016-5282 (bmo#932335) - Don't allow content to request favicons
       from non-whitelisted schemes CVE-2016-5283 (bmo#928187) - &lt;iframe src&gt;
       fragment timing attack can reveal cross-origin data CVE-2016-5284
       (bmo#1303127) - Add-on update site certificate pin expiration
       CVE-2016-5256 - Memory safety bugs fixed in Firefox 49 CVE-2016-5257 -
       Memory safety bugs fixed in Firefox 49 and Firefox ESR 45.4
   - requires NSS 3.25

   - Mozilla Firefox 48.0.2:
     * Mitigate a startup crash issue caused on Windows (bmo#1291738)

   mozilla-nss was updated to NSS 3.25. New functionality:
     * Implemented DHE key agreement for TLS 1.3
     * Added support for ChaCha with TLS 1.3
     * Added support for TLS 1.2 ciphersuites that use SHA384 as the PRF
     * In previous versions, when using client authentication with TLS 1.2,
       NSS only supported certificate_verify messages that used the same
       signature hash algorithm as used by the PRF. This limitation has been
       removed.
     * Several functions have been added to the public API of the NSS
       Cryptoki Framework. New functions:
     * NSSCKFWSlot_GetSlotID
     * NSSCKFWSession_GetFWSlot
     * NSSCKFWInstance_DestroySessionHandle
     * NSSCKFWInstance_FindSessionHandle Notable changes:
     * An SSL socket can no longer be configured to allow both TLS 1.3 and
       SSLv3
     * Regression fix: NSS no longer reports a failure if an application
       attempts to disable the SSLv2 protocol.
     * The list of trusted CA certificates has been updated to version 2.8
     * The following CA certificate was Removed Sonera Class1 CA
     * The following CA certificates were Added Hellenic Academic and
       Research Institutions RootCA 2015 Hellenic Academic and Research
       Institutions ECC RootCA 2015 Certplus Root CA G1 Certplus Root CA G2
       OpenTrust Root CA G1 OpenTrust Root CA G2 OpenTrust Root CA G3</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2386-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-49.0.1-125.2">MozillaFirefox-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-49.0.1-125.2">MozillaFirefox-branding-upstream-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-49.0.1-125.2">MozillaFirefox-buildsymbols-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-devel-49.0.1-125.2">MozillaFirefox-devel-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-49.0.1-125.2">MozillaFirefox-translations-common-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-49.0.1-125.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-49.0.1-125.2">MozillaFirefox-translations-other-49.0.1-125.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.25-91.1">
      <FullProductName ProductID="libfreebl3-3.25-91.1">libfreebl3-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.25-91.1">
      <FullProductName ProductID="libfreebl3-32bit-3.25-91.1">libfreebl3-32bit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.25-91.1">
      <FullProductName ProductID="libsoftokn3-3.25-91.1">libsoftokn3-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.25-91.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.25-91.1">libsoftokn3-32bit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-3.25-91.1">mozilla-nss-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.25-91.1">mozilla-nss-32bit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-certs-3.25-91.1">mozilla-nss-certs-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.25-91.1">mozilla-nss-certs-32bit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-devel-3.25-91.1">mozilla-nss-devel-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.25-91.1">mozilla-nss-sysinit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.25-91.1">mozilla-nss-sysinit-32bit-3.25-91.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.25-91.1">
      <FullProductName ProductID="mozilla-nss-tools-3.25-91.1">mozilla-nss-tools-3.25-91.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::net::IsValidReferrerPolicy function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a Content Security Policy (CSP) referrer directive with zero values.</Note>
    </Notes>
    <CVE>CVE-2016-2827</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2827.html</URL>
        <Description>CVE-2016-2827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5256</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5256.html</URL>
        <Description>CVE-2016-5256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4 and Thunderbird &lt; 45.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-5257</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5257.html</URL>
        <Description>CVE-2016-5257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the nsCaseTransformTextRunFactory::TransformString function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to cause a denial of service (boolean out-of-bounds write) or possibly have unspecified other impact via Unicode characters that are mishandled during text conversion.</Note>
    </Notes>
    <CVE>CVE-2016-5270</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5270.html</URL>
        <Description>CVE-2016-5270</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PropertyProvider::GetSpacingInternal function in Mozilla Firefox before 49.0 allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via text runs in conjunction with a "display: contents" Cascading Style Sheets (CSS) property.</Note>
    </Notes>
    <CVE>CVE-2016-5271</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5271.html</URL>
        <Description>CVE-2016-5271</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsImageGeometryMixin class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 does not properly perform a cast of an unspecified variable during handling of INPUT elements, which allows remote attackers to execute arbitrary code via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5272</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5272.html</URL>
        <Description>CVE-2016-5272</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::a11y::HyperTextAccessible::GetChildOffset function in the accessibility implementation in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5273</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5273.html</URL>
        <Description>CVE-2016-5273</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsFrameManager::CaptureFrameState function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between restyling and the Web Animations model implementation.</Note>
    </Notes>
    <CVE>CVE-2016-5274</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5274.html</URL>
        <Description>CVE-2016-5274</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the mozilla::gfx::FilterSupport::ComputeSourceNeededRegions function in Mozilla Firefox before 49.0 allows remote attackers to execute arbitrary code by leveraging improper interaction between empty filters and CANVAS element rendering.</Note>
    </Notes>
    <CVE>CVE-2016-5275</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5275.html</URL>
        <Description>CVE-2016-5275</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the mozilla::a11y::DocAccessible::ProcessInvalidationList function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an aria-owns attribute.</Note>
    </Notes>
    <CVE>CVE-2016-5276</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5276.html</URL>
        <Description>CVE-2016-5276</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsRefreshDriver::Tick function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by leveraging improper interaction between timeline destruction and the Web Animations model implementation.</Note>
    </Notes>
    <CVE>CVE-2016-5277</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5277.html</URL>
        <Description>CVE-2016-5277</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the nsBMPEncoder::AddImageFrame function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via a crafted image data that is mishandled during the encoding of an image frame to an image.</Note>
    </Notes>
    <CVE>CVE-2016-5278</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5278.html</URL>
        <Description>CVE-2016-5278</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 allows user-assisted remote attackers to obtain sensitive full-pathname information during a local-file drag-and-drop operation via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2016-5279</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5279.html</URL>
        <Description>CVE-2016-5279</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the mozilla::nsTextNodeDirectionalityMap::RemoveElementFromMap function in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code via bidirectional text.</Note>
    </Notes>
    <CVE>CVE-2016-5280</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5280.html</URL>
        <Description>CVE-2016-5280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the DOMSVGLength class in Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 allows remote attackers to execute arbitrary code by leveraging improper interaction between JavaScript code and an SVG document.</Note>
    </Notes>
    <CVE>CVE-2016-5281</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5281.html</URL>
        <Description>CVE-2016-5281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 does not properly restrict the scheme in favicon requests, which might allow remote attackers to obtain sensitive information via unspecified vectors, as demonstrated by a jar: URL for a favicon resource.</Note>
    </Notes>
    <CVE>CVE-2016-5282</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5282.html</URL>
        <Description>CVE-2016-5282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0 allows remote attackers to bypass the Same Origin Policy via a crafted fragment identifier in the SRC attribute of an IFRAME element, leading to insufficient restrictions on link-color information after a document is resized.</Note>
    </Notes>
    <CVE>CVE-2016-5283</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5283.html</URL>
        <Description>CVE-2016-5283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 49.0, Firefox ESR 45.x before 45.4, and Thunderbird &lt; 45.4 rely on unintended expiration dates for Preloaded Public Key Pinning, which allows man-in-the-middle attackers to spoof add-on updates by leveraging possession of an X.509 server certificate for addons.mozilla.org signed by an arbitrary built-in Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2016-5284</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-09/msg00021.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5284.html</URL>
        <Description>CVE-2016-5284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/999701</URL>
        <Description>SUSE Bug 999701</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
