<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1389-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-08-13T10:58:04Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-08-13T10:58:04Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-08-13T10:58:04Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
- update to Firefox 40.0 (bnc#940806)
  * Added protection against unwanted software downloads
  * Suggested Tiles show sites of interest, based on categories
    from your recent browsing history
  * Hello allows adding a link to conversations to provide context
    on what the conversation will be about
  * New style for add-on manager based on the in-content
    preferences style
  * Improved scrolling, graphics, and video playback performance
    with off main thread compositing (GNU/Linux only)
  * Graphic blocklist mechanism improved: Firefox version ranges
    can be specified, limiting the number of devices blocked
  security fixes:
  * MFSA 2015-79/CVE-2015-4473/CVE-2015-4474
    Miscellaneous memory safety hazards
  * MFSA 2015-80/CVE-2015-4475 (bmo#1175396)
    Out-of-bounds read with malformed MP3 file
  * MFSA 2015-81/CVE-2015-4477 (bmo#1179484)
    Use-after-free in MediaStream playback
  * MFSA 2015-82/CVE-2015-4478 (bmo#1105914)
    Redefinition of non-configurable JavaScript object properties
  * MFSA 2015-83/CVE-2015-4479/CVE-2015-4480/CVE-2015-4493
    Overflow issues in libstagefright
  * MFSA 2015-84/CVE-2015-4481 (bmo1171518)
    Arbitrary file overwriting through Mozilla Maintenance Service
    with hard links (only affected Windows)
  * MFSA 2015-85/CVE-2015-4482 (bmo#1184500)
    Out-of-bounds write with Updater and malicious MAR file
    (does not affect openSUSE RPM packages which do not ship the
     updater)
  * MFSA 2015-86/CVE-2015-4483 (bmo#1148732)
    Feed protocol with POST bypasses mixed content protections
  * MFSA 2015-87/CVE-2015-4484 (bmo#1171540)
    Crash when using shared memory in JavaScript
  * MFSA 2015-88/CVE-2015-4491 (bmo#1184009)
    Heap overflow in gdk-pixbuf when scaling bitmap images
  * MFSA 2015-89/CVE-2015-4485/CVE-2015-4486 (bmo#1177948, bmo#1178148)
    Buffer overflows on Libvpx when decoding WebM video
  * MFSA 2015-90/CVE-2015-4487/CVE-2015-4488/CVE-2015-4489
    Vulnerabilities found through code inspection
  * MFSA 2015-91/CVE-2015-4490 (bmo#1086999)
    Mozilla Content Security Policy allows for asterisk wildcards
    in violation of CSP specification
  * MFSA 2015-92/CVE-2015-4492 (bmo#1185820)
    Use-after-free in XMLHttpRequest with shared workers
- added mozilla-no-stdcxx-check.patch
- removed obsolete patches
  * mozilla-add-glibcxx_use_cxx11_abi.patch
  * firefox-multilocale-chrome.patch
- rebased patches
- requires version 40 of the branding package
- removed browser/searchplugins/ location as it's not valid anymore

- includes security update to Firefox 39.0.3 (bnc#940918)
  * MFSA 2015-78/CVE-2015-4495 (bmo#1179262, bmo#1178058)
    Same origin violation and local file stealing via PDF reader
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1389-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE 13.2">
      <Branch Type="Product Name" Name="openSUSE 13.2">
        <FullProductName ProductID="openSUSE 13.2">openSUSE 13.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-40.0-38.1">MozillaFirefox-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-openSUSE-40-4.3.1">
      <FullProductName ProductID="MozillaFirefox-branding-openSUSE-40-4.3.1">MozillaFirefox-branding-openSUSE-40-4.3.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-40.0-38.1">MozillaFirefox-branding-upstream-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-40.0-38.1">MozillaFirefox-buildsymbols-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-debuginfo-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-debuginfo-40.0-38.1">MozillaFirefox-debuginfo-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-debugsource-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-debugsource-40.0-38.1">MozillaFirefox-debugsource-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-devel-40.0-38.1">MozillaFirefox-devel-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-40.0-38.1">MozillaFirefox-translations-common-40.0-38.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-40.0-38.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-40.0-38.1">MozillaFirefox-translations-other-40.0-38.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-40.0-38.1">MozillaFirefox-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-openSUSE-40-4.3.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1">MozillaFirefox-branding-openSUSE-40-4.3.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-upstream-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1">MozillaFirefox-branding-upstream-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-buildsymbols-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1">MozillaFirefox-buildsymbols-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-debuginfo-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1">MozillaFirefox-debuginfo-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-debugsource-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1">MozillaFirefox-debugsource-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-devel-40.0-38.1">MozillaFirefox-devel-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1">MozillaFirefox-translations-common-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-40.0-38.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE 13.2">
      <FullProductName ProductID="openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1">MozillaFirefox-translations-other-40.0-38.1 as a component of openSUSE 13.2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-4473</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4473.html</URL>
        <Description>CVE-2015-4473</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-4474</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4474.html</URL>
        <Description>CVE-2015-4474</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.</Note>
    </Notes>
    <CVE>CVE-2015-4475</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4475.html</URL>
        <Description>CVE-2015-4475</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.</Note>
    </Notes>
    <CVE>CVE-2015-4477</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4477.html</URL>
        <Description>CVE-2015-4477</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.</Note>
    </Notes>
    <CVE>CVE-2015-4478</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4478.html</URL>
        <Description>CVE-2015-4478</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.</Note>
    </Notes>
    <CVE>CVE-2015-4479</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4479.html</URL>
        <Description>CVE-2015-4479</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.</Note>
    </Notes>
    <CVE>CVE-2015-4480</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4480.html</URL>
        <Description>CVE-2015-4480</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the Mozilla Maintenance Service in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Windows allows local users to write to arbitrary files and consequently gain privileges via vectors involving a hard link to a log file during an update.</Note>
    </Notes>
    <CVE>CVE-2015-4481</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4481.html</URL>
        <Description>CVE-2015-4481</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.</Note>
    </Notes>
    <CVE>CVE-2015-4482</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4482.html</URL>
        <Description>CVE-2015-4482</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 40.0 allows man-in-the-middle attackers to bypass a mixed-content protection mechanism via a feed: URL in a POST request.</Note>
    </Notes>
    <CVE>CVE-2015-4483</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4483.html</URL>
        <Description>CVE-2015-4483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.</Note>
    </Notes>
    <CVE>CVE-2015-4484</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4484.html</URL>
        <Description>CVE-2015-4484</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.</Note>
    </Notes>
    <CVE>CVE-2015-4485</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4485.html</URL>
        <Description>CVE-2015-4485</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.</Note>
    </Notes>
    <CVE>CVE-2015-4486</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4486.html</URL>
        <Description>CVE-2015-4486</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an "overflow."</Note>
    </Notes>
    <CVE>CVE-2015-4487</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4487.html</URL>
        <Description>CVE-2015-4487</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.</Note>
    </Notes>
    <CVE>CVE-2015-4488</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4488.html</URL>
        <Description>CVE-2015-4488</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.</Note>
    </Notes>
    <CVE>CVE-2015-4489</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4489.html</URL>
        <Description>CVE-2015-4489</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.</Note>
    </Notes>
    <CVE>CVE-2015-4490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4490.html</URL>
        <Description>CVE-2015-4490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the make_filter_table function in pixops/pixops.c in gdk-pixbuf before 2.31.5, as used in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 on Linux, Google Chrome on Linux, and other products, allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow and application crash) via crafted bitmap dimensions that are mishandled during scaling.</Note>
    </Notes>
    <CVE>CVE-2015-4491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4491.html</URL>
        <Description>CVE-2015-4491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/942801</URL>
        <Description>SUSE Bug 942801</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/948790</URL>
        <Description>SUSE Bug 948790</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.</Note>
    </Notes>
    <CVE>CVE-2015-4492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4492.html</URL>
        <Description>CVE-2015-4492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.</Note>
    </Notes>
    <CVE>CVE-2015-4493</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4493.html</URL>
        <Description>CVE-2015-4493</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.</Note>
    </Notes>
    <CVE>CVE-2015-4495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE 13.2:MozillaFirefox-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-openSUSE-40-4.3.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-branding-upstream-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-buildsymbols-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debuginfo-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-debugsource-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-devel-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-common-40.0-38.1</ProductID>
        <ProductID>openSUSE 13.2:MozillaFirefox-translations-other-40.0-38.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>http://lists.opensuse.org/opensuse-security-announce/2015-08/msg00014.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4495.html</URL>
        <Description>CVE-2015-4495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940806</URL>
        <Description>SUSE Bug 940806</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/940918</URL>
        <Description>SUSE Bug 940918</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
