<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:0934-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-05-15T16:30:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-05-15T16:30:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-05-15T16:30:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">The Mozilla Firefox web browser was updated to version 38.0.1 to fix several security and non-security issues.
This update also includes a Mozilla Network Security Services (NSS) update to version 3.18.1.

The following vulnerabilities and issues were fixed:

Changes in Mozilla Firefox:
- update to Firefox 38.0.1
  stability and regression fixes
  * Systems with first generation NVidia Optimus graphics cards
    may crash on start-up
  * Users who import cookies from Google Chrome can end up with
    broken websites
  * Large animated images may fail to play and may stop other
    images from loading
- update to Firefox 38.0 (bnc#930622)
  * New tab-based preferences
  * Ruby annotation support
  * more info: https://www.mozilla.org/en-US/firefox/38.0/releasenotes/
  security fixes:
  * MFSA 2015-46/CVE-2015-2708/CVE-2015-2709
    Miscellaneous memory safety hazards
  * MFSA 2015-47/VE-2015-0797 (bmo#1080995)
    Buffer overflow parsing H.264 video with Linux Gstreamer
  * MFSA 2015-48/CVE-2015-2710 (bmo#1149542)
    Buffer overflow with SVG content and CSS
  * MFSA 2015-49/CVE-2015-2711 (bmo#1113431)
    Referrer policy ignored when links opened by middle-click and
    context menu
  * MFSA 2015-50/CVE-2015-2712 (bmo#1152280)
    Out-of-bounds read and write in asm.js validation
  * MFSA 2015-51/CVE-2015-2713 (bmo#1153478)
    Use-after-free during text processing with vertical text enabled
  * MFSA 2015-53/CVE-2015-2715 (bmo#988698)
    Use-after-free due to Media Decoder Thread creation during shutdown
  * MFSA 2015-54/CVE-2015-2716 (bmo#1140537)
    Buffer overflow when parsing compressed XML
  * MFSA 2015-55/CVE-2015-2717 (bmo#1154683)
    Buffer overflow and out-of-bounds read while parsing MP4 video
    metadata
  * MFSA 2015-56/CVE-2015-2718 (bmo#1146724)
    Untrusted site hosting trusted page can intercept webchannel
    responses
  * MFSA 2015-57/CVE-2011-3079 (bmo#1087565)
    Privilege escalation through IPC channel messages

Changes in Mozilla NSS:
- update to 3.18.1
  * Firefox target release 38
  * No new functionality is introduced in this release.
  Notable Changes:
  * The following CA certificate had the Websites and Code Signing
    trust bits restored to their original state to allow more time
    to develop a better transition strategy for affected sites:
    - OU = Equifax Secure Certificate Authority
  * The following CA certificate was removed:
    - CN = e-Guven Kok Elektronik Sertifika Hizmet Saglayicisi
  * The following intermediate CA certificate has been added as
    actively distrusted because it was mis-used to issue certificates
    for domain names the holder did not own or control:
    - CN=MCSHOLDING TEST, O=MCSHOLDING, C=EG
  * The version number of the updated root CA list has been set
    to 2.4
- update to 3.18
  * Firefox target release 38
  New functionality:
  * When importing certificates and keys from a PKCS#12 source,
    it's now possible to override the nicknames, prior to importing
    them into the NSS database, using new API
    SEC_PKCS12DecoderRenameCertNicknames.
  * The tstclnt test utility program has new command-line options
    -C, -D, -b and -R.
    Use -C one, two or three times to print information about the
    certificates received from a server, and information about the
    locally found and trusted issuer certificates, to diagnose
    server side configuration issues. It is possible to run tstclnt</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:0934-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-38.0.1-74.1">MozillaFirefox-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-38.0.1-74.1">MozillaFirefox-branding-upstream-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-38.0.1-74.1">MozillaFirefox-buildsymbols-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-devel-38.0.1-74.1">MozillaFirefox-devel-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-38.0.1-74.1">MozillaFirefox-translations-common-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-38.0.1-74.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-38.0.1-74.1">MozillaFirefox-translations-other-38.0.1-74.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.18.1-55.1">
      <FullProductName ProductID="libfreebl3-3.18.1-55.1">libfreebl3-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.18.1-55.1">
      <FullProductName ProductID="libfreebl3-32bit-3.18.1-55.1">libfreebl3-32bit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.18.1-55.1">
      <FullProductName ProductID="libsoftokn3-3.18.1-55.1">libsoftokn3-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.18.1-55.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.18.1-55.1">libsoftokn3-32bit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-3.18.1-55.1">mozilla-nss-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.18.1-55.1">mozilla-nss-32bit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-certs-3.18.1-55.1">mozilla-nss-certs-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.18.1-55.1">mozilla-nss-certs-32bit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-devel-3.18.1-55.1">mozilla-nss-devel-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.18.1-55.1">mozilla-nss-sysinit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.18.1-55.1">mozilla-nss-sysinit-32bit-3.18.1-55.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.18.1-55.1">
      <FullProductName ProductID="mozilla-nss-tools-3.18.1-55.1">mozilla-nss-tools-3.18.1-55.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.</Note>
    </Notes>
    <CVE>CVE-2011-3079</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3079.html</URL>
        <Description>CVE-2011-3079</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1122983</URL>
        <Description>SUSE Bug 1122983</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/760264</URL>
        <Description>SUSE Bug 760264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/986639</URL>
        <Description>SUSE Bug 986639</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2708</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2708.html</URL>
        <Description>CVE-2015-2708</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-2709</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2709.html</URL>
        <Description>CVE-2015-2709</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.</Note>
    </Notes>
    <CVE>CVE-2015-2710</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2710.html</URL>
        <Description>CVE-2015-2710</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 38.0 does not recognize a referrer policy delivered by a referrer META element in cases of context-menu navigation and middle-click navigation, which allows remote attackers to obtain sensitive information by reading web-server Referer logs that contain private data in a URL, as demonstrated by a private path component.</Note>
    </Notes>
    <CVE>CVE-2015-2711</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2711.html</URL>
        <Description>CVE-2015-2711</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The asm.js implementation in Mozilla Firefox before 38.0 does not properly determine heap lengths during identification of cases in which bounds checking may be safely skipped, which allows remote attackers to trigger out-of-bounds write operations and possibly execute arbitrary code, or trigger out-of-bounds read operations and possibly obtain sensitive information from process memory, via crafted JavaScript.</Note>
    </Notes>
    <CVE>CVE-2015-2712</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2712.html</URL>
        <Description>CVE-2015-2712</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.</Note>
    </Notes>
    <CVE>CVE-2015-2713</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2713.html</URL>
        <Description>CVE-2015-2713</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the nsThreadManager::RegisterCurrentThread function in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and heap memory corruption) by leveraging improper Media Decoder Thread creation at the time of a shutdown.</Note>
    </Notes>
    <CVE>CVE-2015-2715</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2715.html</URL>
        <Description>CVE-2015-2715</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.</Note>
    </Notes>
    <CVE>CVE-2015-2716</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2716.html</URL>
        <Description>CVE-2015-2716</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/939077</URL>
        <Description>SUSE Bug 939077</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980391</URL>
        <Description>SUSE Bug 980391</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983985</URL>
        <Description>SUSE Bug 983985</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in libstagefright in Mozilla Firefox before 38.0 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and out-of-bounds read) via an MP4 video file containing invalid metadata.</Note>
    </Notes>
    <CVE>CVE-2015-2717</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2717.html</URL>
        <Description>CVE-2015-2717</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The WebChannel.jsm module in Mozilla Firefox before 38.0 allows remote attackers to bypass the Same Origin Policy and obtain sensitive webchannel-response data via a crafted web site containing an IFRAME element referencing a different web site that is intended to read this data.</Note>
    </Notes>
    <CVE>CVE-2015-2718</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2718.html</URL>
        <Description>CVE-2015-2718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/930622</URL>
        <Description>SUSE Bug 930622</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
