<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update update for MozillaFirefox, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:1211-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-05-04T09:38:54Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-05-04T09:38:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-05-04T09:38:54Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update update for MozillaFirefox, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Firefox 46.0 fixes several security issues and bugs (boo#977333).

The following vulnerabilities were fixed:

- CVE-2016-2804: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977373)
- CVE-2016-2806: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977375)
- CVE-2016-2807: Miscellaneous memory safety hazards - MFSA 2016-39 (boo#977376)
- CVE-2016-2808: Write to invalid HashMap entry through JavaScript.watch() - MFSA 2016-47 (boo#977386)
- CVE-2016-2811: Use-after-free in Service Worker - MFSA 2016-42 (boo#977379)
- CVE-2016-2812: Buffer overflow in Service Worker - MFSA 2016-42 (boo#977379)
- CVE-2016-2814: Buffer overflow in libstagefright with CENC offsets - MFSA 2016-44 (boo#977381)
- CVE-2016-2816: CSP not applied to pages sent with multipart/x-mixed-replace - MFSA 2016-45 (boo#977382)
- CVE-2016-2817: Elevation of privilege with chrome.tabs.update API in web extensions - MFSA 2016-46 (boo#977384)
- CVE-2016-2820: Firefox Health Reports could accept events from untrusted domains - MFSA 2016-48 (boo#977388)

The following miscellaneous changes are included:

- Improved security of the JavaScript Just In Time (JIT) Compiler
- WebRTC fixes to improve performance and stability
- Added support for document.elementsFromPoint
- Added HKDF support for Web Crypto API

The following changes from Mozilla Firefox 45.0.2 are included:
- Fix an issue impacting the cookie header when third-party cookies are blocked
- Fix a web compatibility regression impacting the srcset attribute of the image tag
- Fix a crash impacting the video playback with Media Source Extension
- Fix a regression impacting some specific uploads
- Fix a regression with the copy and paste with some old versions of some Gecko applications like Thunderbird

The following changes from Mozilla Firefox 45.0.2 are included:
    
- Fix a regression causing search engine settings to be lost in some context
- Bring back non-standard jar: URIs to fix a regression in IBM iNotes
- XSLTProcessor.importStylesheet was failing when import was used
- Fix an issue which could cause the list of search provider to be empty
- Fix a regression when using the location bar (bmo#1254503)
- Fix some loading issues when Accept third-party cookies: was set to Never
- Disabled Graphite font shaping library

The minimum requirements increased to NSPR 4.12 and NSS 3.22.3.

Mozilla NSS was updated to 3.22.3 as a dependency for Mozilla Firefox 46.0, with the following changes:

- Increase compatibility of TLS extended master secret, don't send an empty TLS extension last in the handshake (bmo#1243641)
- RSA-PSS signatures are now supported
- Pseudorandom functions based on hashes other than SHA-1 are now supported
- Enforce an External Policy on NSS from a config file
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      <Description>E-Mail link for openSUSE-SU-2016:1211-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Leap 42.1">
      <Branch Type="Product Name" Name="openSUSE Leap 42.1">
        <FullProductName ProductID="openSUSE Leap 42.1">openSUSE Leap 42.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-46.0-21.1">MozillaFirefox-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-46.0-21.1">MozillaFirefox-branding-upstream-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-46.0-21.1">MozillaFirefox-buildsymbols-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-devel-46.0-21.1">MozillaFirefox-devel-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-46.0-21.1">MozillaFirefox-translations-common-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-46.0-21.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-46.0-21.1">MozillaFirefox-translations-other-46.0-21.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.22.3-15.2">
      <FullProductName ProductID="libfreebl3-3.22.3-15.2">libfreebl3-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.22.3-15.2">
      <FullProductName ProductID="libfreebl3-32bit-3.22.3-15.2">libfreebl3-32bit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.22.3-15.2">
      <FullProductName ProductID="libsoftokn3-3.22.3-15.2">libsoftokn3-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.22.3-15.2">
      <FullProductName ProductID="libsoftokn3-32bit-3.22.3-15.2">libsoftokn3-32bit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-3.22.3-15.2">mozilla-nss-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-32bit-3.22.3-15.2">mozilla-nss-32bit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-certs-3.22.3-15.2">mozilla-nss-certs-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.22.3-15.2">mozilla-nss-certs-32bit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-devel-3.22.3-15.2">mozilla-nss-devel-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-sysinit-3.22.3-15.2">mozilla-nss-sysinit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.22.3-15.2">mozilla-nss-sysinit-32bit-3.22.3-15.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.22.3-15.2">
      <FullProductName ProductID="mozilla-nss-tools-3.22.3-15.2">mozilla-nss-tools-3.22.3-15.2</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-46.0-21.1">MozillaFirefox-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1">MozillaFirefox-branding-upstream-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1">MozillaFirefox-buildsymbols-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1">MozillaFirefox-devel-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1">MozillaFirefox-translations-common-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-46.0-21.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1">MozillaFirefox-translations-other-46.0-21.1 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-3.22.3-15.2">libfreebl3-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2">libfreebl3-32bit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2">libsoftokn3-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-32bit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2">libsoftokn3-32bit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2">mozilla-nss-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2">mozilla-nss-32bit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2">mozilla-nss-certs-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-32bit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2">mozilla-nss-certs-32bit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2">mozilla-nss-devel-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2">mozilla-nss-sysinit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-32bit-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2">mozilla-nss-sysinit-32bit-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.22.3-15.2" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 42.1">
      <FullProductName ProductID="openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2">mozilla-nss-tools-3.22.3-15.2 as a component of openSUSE Leap 42.1</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2804</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2804.html</URL>
        <Description>CVE-2016-2804</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977373</URL>
        <Description>SUSE Bug 977373</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2806</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2806.html</URL>
        <Description>CVE-2016-2806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977375</URL>
        <Description>SUSE Bug 977375</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2807</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2807.html</URL>
        <Description>CVE-2016-2807</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977376</URL>
        <Description>SUSE Bug 977376</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-2808</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2808.html</URL>
        <Description>CVE-2016-2808</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977386</URL>
        <Description>SUSE Bug 977386</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.</Note>
    </Notes>
    <CVE>CVE-2016-2811</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2811.html</URL>
        <Description>CVE-2016-2811</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977379</URL>
        <Description>SUSE Bug 977379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-2812</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.1</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2812.html</URL>
        <Description>CVE-2016-2812</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977379</URL>
        <Description>SUSE Bug 977379</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.</Note>
    </Notes>
    <CVE>CVE-2016-2814</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:N/I:N/A:C</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2814.html</URL>
        <Description>CVE-2016-2814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977333</URL>
        <Description>SUSE Bug 977333</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977381</URL>
        <Description>SUSE Bug 977381</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.</Note>
    </Notes>
    <CVE>CVE-2016-2816</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2816.html</URL>
        <Description>CVE-2016-2816</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977382</URL>
        <Description>SUSE Bug 977382</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.</Note>
    </Notes>
    <CVE>CVE-2016-2817</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2817.html</URL>
        <Description>CVE-2016-2817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977384</URL>
        <Description>SUSE Bug 977384</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.</Note>
    </Notes>
    <CVE>CVE-2016-2820</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-branding-upstream-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-buildsymbols-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-devel-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-common-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:MozillaFirefox-translations-other-46.0-21.1</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libfreebl3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:libsoftokn3-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-certs-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-devel-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-sysinit-32bit-3.22.3-15.2</ProductID>
        <ProductID>openSUSE Leap 42.1:mozilla-nss-tools-3.22.3-15.2</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-security-announce/2016-05/msg00005.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2820.html</URL>
        <Description>CVE-2016-2820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/977388</URL>
        <Description>SUSE Bug 977388</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
