<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for Mozilla Firefox, Thunderbird and NSS</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3011-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-05T14:56:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-05T14:56:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-05T14:56:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for Mozilla Firefox, Thunderbird and NSS</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Firefox 50.0.2, Thunderbird 45.5.1 and NSS 3.16.2 fixes a number of security issues.

The following vulnerabilities were fixed in Mozilla Firefox (MFSA 2016-89):

   - CVE-2016-5296: Heap-buffer-overflow WRITE in rasterize_edges_1
     (bmo#1292443)
   - CVE-2016-5292: URL parsing causes crash (bmo#1288482)
   - CVE-2016-5297: Incorrect argument length checking in Javascript
     (bmo#1303678)
   - CVE-2016-9064: Addons update must verify IDs match between current and
     new versions (bmo#1303418)
   - CVE-2016-9066: Integer overflow leading to a buffer overflow in
     nsScriptLoadHandler (bmo#1299686)
   - CVE-2016-9067: heap-use-after-free in nsINode::ReplaceOrInsertBefore
     (bmo#1301777, bmo#1308922 (CVE-2016-9069))
   - CVE-2016-9068: heap-use-after-free in nsRefreshDriver (bmo#1302973)
   - CVE-2016-9075: WebExtensions can access the mozAddonManager API and use
     it to gain elevated privileges (bmo#1295324)
   - CVE-2016-9077: Canvas filters allow feDisplacementMaps to be applied to
     cross-origin images, allowing timing attacks on them (bmo#1298552)
   - CVE-2016-5291: Same-origin policy violation using local HTML file and
     saved shortcut file (bmo#1292159)
   - CVE-2016-9070: Sidebar bookmark can have reference to chrome window
     (bmo#1281071)
   - CVE-2016-9073: windows.create schema doesn't specify 'format':
     'relativeUrl' (bmo#1289273)
   - CVE-2016-9076: select dropdown menu can be used for URL bar spoofing on
     e10s (bmo#1276976)
   - CVE-2016-9063: Possible integer overflow to fix inside XML_Parse in
     expat (bmo#1274777)
   - CVE-2016-9071: Probe browser history via HSTS/301 redirect + CSP
     (bmo#1285003)
   - CVE-2016-5289: Memory safety bugs fixed in Firefox 50
   - CVE-2016-5290: Memory safety bugs fixed in Firefox 50 and Firefox ESR
     45.5

   The following vulnerabilities were fixed in Mozilla NSS 3.26.1:

   - CVE-2016-9074: Insufficient timing side-channel resistance in divSpoiler
     (bmo#1293334)

   Mozilla Firefox now requires mozilla-nss 3.26.2.

   New features in Mozilla Firefox:

   - Updates to keyboard shortcuts Set a preference to have Ctrl+Tab cycle
     through tabs in recently used order View a page in Reader Mode by using
     Ctrl+Alt+R
   - Added option to Find in page that allows users to limit search to whole
     words only
   - Added download protection for a large number of executable file types on
     Windows, Mac and Linux
   - Fixed rendering of dashed and dotted borders with rounded corners
     (border-radius)
   - Added a built-in Emoji set for operating systems without native Emoji
     fonts
   - Blocked versions of libavcodec older than 54.35.1
   - additional locale

   mozilla-nss was updated to 3.26.2, incorporating the following changes:

   - the selfserv test utility has been enhanced to support ALPN (HTTP/1.1)
     and 0-RTT
   - The following CA certificate was added: CN = ISRG Root X1
   - NPN is disabled and ALPN is enabled by default
   - MD5 signature algorithms sent by the server in CertificateRequest
     messages are now properly ignored</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:3011-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-50.0.2-131.1">MozillaFirefox-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-50.0.2-131.1">MozillaFirefox-branding-upstream-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-50.0.2-131.1">MozillaFirefox-buildsymbols-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-devel-50.0.2-131.1">MozillaFirefox-devel-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-50.0.2-131.1">MozillaFirefox-translations-common-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-50.0.2-131.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-50.0.2-131.1">MozillaFirefox-translations-other-50.0.2-131.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-45.5.1-70.92.1">
      <FullProductName ProductID="MozillaThunderbird-45.5.1-70.92.1">MozillaThunderbird-45.5.1-70.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.5.1-70.92.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.5.1-70.92.1">MozillaThunderbird-buildsymbols-45.5.1-70.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.5.1-70.92.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.5.1-70.92.1">MozillaThunderbird-devel-45.5.1-70.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.5.1-70.92.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.5.1-70.92.1">MozillaThunderbird-translations-common-45.5.1-70.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.5.1-70.92.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.5.1-70.92.1">MozillaThunderbird-translations-other-45.5.1-70.92.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.26.2-94.1">
      <FullProductName ProductID="libfreebl3-3.26.2-94.1">libfreebl3-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.26.2-94.1">
      <FullProductName ProductID="libfreebl3-32bit-3.26.2-94.1">libfreebl3-32bit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.26.2-94.1">
      <FullProductName ProductID="libsoftokn3-3.26.2-94.1">libsoftokn3-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.26.2-94.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.26.2-94.1">libsoftokn3-32bit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-3.26.2-94.1">mozilla-nss-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.26.2-94.1">mozilla-nss-32bit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-certs-3.26.2-94.1">mozilla-nss-certs-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.26.2-94.1">mozilla-nss-certs-32bit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-devel-3.26.2-94.1">mozilla-nss-devel-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.26.2-94.1">mozilla-nss-sysinit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.26.2-94.1">mozilla-nss-sysinit-32bit-3.26.2-94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.26.2-94.1">
      <FullProductName ProductID="mozilla-nss-tools-3.26.2-94.1">mozilla-nss-tools-3.26.2-94.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 49. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5289</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5289.html</URL>
        <Description>CVE-2016-5289</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010426</URL>
        <Description>SUSE Bug 1010426</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 49 and Firefox ESR 45.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5290</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5290.html</URL>
        <Description>CVE-2016-5290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010427</URL>
        <Description>SUSE Bug 1010427</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A same-origin policy bypass with local shortcut files to load arbitrary local content from disk. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5291</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5291.html</URL>
        <Description>CVE-2016-5291</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010410</URL>
        <Description>SUSE Bug 1010410</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During URL parsing, a maliciously crafted URL can cause a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5292</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5292.html</URL>
        <Description>CVE-2016-5292</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010399</URL>
        <Description>SUSE Bug 1010399</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When the Mozilla Updater is run, if the Updater's log file in the working directory points to a hardlink, data can be appended to an arbitrary local file. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5293</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5293.html</URL>
        <Description>CVE-2016-5293</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010400</URL>
        <Description>SUSE Bug 1010400</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Mozilla Updater can be made to choose an arbitrary target working directory for output files resulting from the update process. This vulnerability requires local system access. Note: this issue only affects Windows operating systems. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5294</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5294.html</URL>
        <Description>CVE-2016-5294</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010396</URL>
        <Description>SUSE Bug 1010396</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">This vulnerability allows an attacker to use the Mozilla Maintenance Service to escalate privilege by having the Maintenance Service invoke the Mozilla Updater to run malicious local files. This vulnerability requires local system access and is a variant of MFSA2013-44. Note: this issue only affects Windows operating systems. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5295</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5295.html</URL>
        <Description>CVE-2016-5295</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010411</URL>
        <Description>SUSE Bug 1010411</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A heap-buffer-overflow in Cairo when processing SVG content caused by compiler optimization, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5296</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5296.html</URL>
        <Description>CVE-2016-5296</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010395</URL>
        <Description>SUSE Bug 1010395</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An error in argument length checking in JavaScript, leading to potential integer overflows or other bounds checking issues. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5297</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5297.html</URL>
        <Description>CVE-2016-5297</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010401</URL>
        <Description>SUSE Bug 1010401</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A mechanism where disruption of the loading of a new web page can cause the previous page's favicon and SSL indicator to not be reset when the new page is loaded. Note: this issue only affects Firefox for Android. Desktop Firefox is unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5298</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5298.html</URL>
        <Description>CVE-2016-5298</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010412</URL>
        <Description>SUSE Bug 1010412</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A previously installed malicious Android application with same signature-level permissions as Firefox can intercept AuthTokens meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-5299</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5299.html</URL>
        <Description>CVE-2016-5299</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010413</URL>
        <Description>SUSE Bug 1010413</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A previously installed malicious Android application which defines a specific signature-level permissions used by Firefox can access API keys meant for Firefox only. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9061</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9061.html</URL>
        <Description>CVE-2016-9061</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010418</URL>
        <Description>SUSE Bug 1010418</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Private browsing mode leaves metadata information, such as URLs, for sites visited in "browser.db" and "browser.db-wal" files within the Firefox profile after the mode is exited. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9062</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9062.html</URL>
        <Description>CVE-2016-9062</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010419</URL>
        <Description>SUSE Bug 1010419</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9063</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9063.html</URL>
        <Description>CVE-2016-9063</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010424</URL>
        <Description>SUSE Bug 1010424</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1047240</URL>
        <Description>SUSE Bug 1047240</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1123115</URL>
        <Description>SUSE Bug 1123115</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Add-on updates failed to verify that the add-on ID inside the signed package matched the ID of the add-on being updated. An attacker who could perform a man-in-the-middle attack on the user's connection to the update server and defeat the certificate pinning protection could provide a malicious signed add-on instead of a valid update. This vulnerability affects Firefox ESR &lt; 45.5 and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9064</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9064.html</URL>
        <Description>CVE-2016-9064</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010402</URL>
        <Description>SUSE Bug 1010402</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The location bar in Firefox for Android can be spoofed by forcing a user into fullscreen mode, blocking its exiting, and creating of a fake location bar without any user notification. Note: This issue only affects Firefox for Android. Other versions and operating systems are unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9065</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9065.html</URL>
        <Description>CVE-2016-9065</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010403</URL>
        <Description>SUSE Bug 1010403</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A buffer overflow resulting in a potentially exploitable crash due to memory allocation issues when handling large amounts of incoming data. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9066</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9066.html</URL>
        <Description>CVE-2016-9066</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010404</URL>
        <Description>SUSE Bug 1010404</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Two use-after-free errors during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9067</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9067.html</URL>
        <Description>CVE-2016-9067</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010405</URL>
        <Description>SUSE Bug 1010405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free during web animations when working with timelines resulting in a potentially exploitable crash. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9068</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9068.html</URL>
        <Description>CVE-2016-9068</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010406</URL>
        <Description>SUSE Bug 1010406</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free in nsINode::ReplaceOrInsertBefore during DOM operations resulting in potentially exploitable crashes. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9069</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9069.html</URL>
        <Description>CVE-2016-9069</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010405</URL>
        <Description>SUSE Bug 1010405</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A maliciously crafted page loaded to the sidebar through a bookmark can reference a privileged chrome window and engage in limited JavaScript operations violating cross-origin protections. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9070</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9070.html</URL>
        <Description>CVE-2016-9070</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010420</URL>
        <Description>SUSE Bug 1010420</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Content Security Policy combined with HTTP to HTTPS redirection can be used by malicious server to verify whether a known site is within a user's browser history. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9071</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9071.html</URL>
        <Description>CVE-2016-9071</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010425</URL>
        <Description>SUSE Bug 1010425</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="23">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When a new Firefox profile is created on 64-bit Windows installations, the sandbox for 64-bit NPAPI plugins is not enabled by default. Note: This issue only affects 64-bit Windows. 32-bit Windows and other operating systems are unaffected. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9072</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9072.html</URL>
        <Description>CVE-2016-9072</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010407</URL>
        <Description>SUSE Bug 1010407</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="24">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebExtensions can bypass security checks to load privileged URLs and potentially escape the WebExtension sandbox. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9073</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9073.html</URL>
        <Description>CVE-2016-9073</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010421</URL>
        <Description>SUSE Bug 1010421</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="25">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An existing mitigation of timing side-channel attacks is insufficient in some circumstances. This issue is addressed in Network Security Services (NSS) 3.26.1. This vulnerability affects Thunderbird &lt; 45.5, Firefox ESR &lt; 45.5, and Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9074</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9074.html</URL>
        <Description>CVE-2016-9074</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010422</URL>
        <Description>SUSE Bug 1010422</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="26">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue where WebExtensions can use the mozAddonManager API to elevate privilege due to privileged pages being allowed in the permissions list. This allows a malicious extension to then install additional extensions without explicit user permission. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9075</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.6</BaseScore>
        <Vector>AV:N/AC:H/Au:S/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9075.html</URL>
        <Description>CVE-2016-9075</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010408</URL>
        <Description>SUSE Bug 1010408</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="27">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue where a "&lt;select&gt;" dropdown menu can be used to cover location bar content, resulting in potential spoofing attacks. This attack requires e10s to be enabled in order to function. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9076</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9076.html</URL>
        <Description>CVE-2016-9076</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010423</URL>
        <Description>SUSE Bug 1010423</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="28">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Canvas allows the use of the "feDisplacementMap" filter on images loaded cross-origin. The rendering by the filter is variable depending on the input pixel, allowing for timing attacks when the images are loaded from third party locations. This vulnerability affects Firefox &lt; 50.</Note>
    </Notes>
    <CVE>CVE-2016-9077</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>2.6</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9077.html</URL>
        <Description>CVE-2016-9077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1009026</URL>
        <Description>SUSE Bug 1009026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1010409</URL>
        <Description>SUSE Bug 1010409</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="29">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Redirection from an HTTP connection to a "data:" URL assigns the referring site's origin to the "data:" URL in some circumstances. This can result in same-origin violations against a domain if it loads resources from malicious sites. Cross-origin setting of cookies has been demonstrated without the ability to read them. Note: This issue only affects Firefox 49 and 50. This vulnerability affects Firefox &lt; 50.0.1.</Note>
    </Notes>
    <CVE>CVE-2016-9078</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9078.html</URL>
        <Description>CVE-2016-9078</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012807</URL>
        <Description>SUSE Bug 1012807</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="30">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in SVG Animation has been discovered. An exploit built on this vulnerability has been discovered in the wild targeting Firefox and Tor Browser users on Windows. This vulnerability affects Firefox &lt; 50.0.2, Firefox ESR &lt; 45.5.1, and Thunderbird &lt; 45.5.1.</Note>
    </Notes>
    <CVE>CVE-2016-9079</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-12/msg00010.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9079.html</URL>
        <Description>CVE-2016-9079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1012964</URL>
        <Description>SUSE Bug 1012964</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
