<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:2735-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-11-05T10:09:48Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-11-05T10:09:48Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-11-05T10:09:48Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">Mozilla Firefox was updated to 49.0.2 to fix two security issues and some bugs.

   The following vulnerabilities were fixed:

   * CVE-2016-5287: Crash in nsTArray_base (bsc#1006475)
   * CVE-2016-5288: Web content can read cache entries (bsc#1006476)

   The following changes and fixes are included:

   * Asynchronous rendering of the Flash plugins is now enabled by default
   * Change D3D9 default fallback preference to prevent graphical artifacts
   * Network issue prevents some users from seeing the Firefox UI on startup
   * Web compatibility issue with file uploads
   * Web compatibility issue with Array.prototype.values
   * Diagnostic information on timing for tab switching
   * Fix a Canvas filters graphics issue affecting HTML5 apps</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:2735-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-49.0.2-128.1">MozillaFirefox-49.0.2-128.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-49.0.2-128.1">MozillaFirefox-branding-upstream-49.0.2-128.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-49.0.2-128.1">MozillaFirefox-buildsymbols-49.0.2-128.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-devel-49.0.2-128.1">MozillaFirefox-devel-49.0.2-128.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-49.0.2-128.1">MozillaFirefox-translations-common-49.0.2-128.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-49.0.2-128.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-49.0.2-128.1">MozillaFirefox-translations-other-49.0.2-128.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potentially exploitable use-after-free crash during actor destruction with service workers. This issue does not affect releases earlier than Firefox 49. This vulnerability affects Firefox &lt; 49.0.2.</Note>
    </Notes>
    <CVE>CVE-2016-5287</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5287.html</URL>
        <Description>CVE-2016-5287</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006475</URL>
        <Description>SUSE Bug 1006475</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Web content could access information in the HTTP cache if e10s is disabled. This can reveal some visited URLs and the contents of those pages. This issue affects Firefox 48 and 49. This vulnerability affects Firefox &lt; 49.0.2.</Note>
    </Notes>
    <CVE>CVE-2016-5288</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-11/msg00015.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5288.html</URL>
        <Description>CVE-2016-5288</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1006476</URL>
        <Description>SUSE Bug 1006476</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
