<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2016:3307-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-12-30T17:01:32Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-12-30T17:01:32Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-12-30T17:01:32Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.

In general, these flaws cannot be exploited through email in Thunderbird because
scripting is disabled when reading mail, but are potentially risks in browser or
browser-like contexts.

The following vulnerabilities were fixed: (boo#1015422)

- CVE-2016-9899: Use-after-free while manipulating DOM events and audio elements
- CVE-2016-9895: CSP bypass using marquee tag
- CVE-2016-9897: Memory corruption in libGLES
- CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
- CVE-2016-9900: Restricted external resources can be loaded by SVG images through data URLs
- CVE-2016-9904: Cross-origin information leak in shared atoms
- CVE-2016-9905: Crash in EnumerateSubDocuments
- CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6

The following bugs were fixed:

- The system integration dialog was shown every time when starting Thunderbird
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-2016-1531</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1015422</URL>
      <Description>SUSE Bug 1015422</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9893/</URL>
      <Description>SUSE CVE CVE-2016-9893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9895/</URL>
      <Description>SUSE CVE CVE-2016-9895 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9897/</URL>
      <Description>SUSE CVE CVE-2016-9897 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9898/</URL>
      <Description>SUSE CVE CVE-2016-9898 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9899/</URL>
      <Description>SUSE CVE CVE-2016-9899 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9900/</URL>
      <Description>SUSE CVE CVE-2016-9900 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9904/</URL>
      <Description>SUSE CVE CVE-2016-9904 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-9905/</URL>
      <Description>SUSE CVE CVE-2016-9905 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Package Hub 12">
      <Branch Type="Product Name" Name="SUSE Package Hub 12">
        <FullProductName ProductID="SUSE Package Hub 12" CPE="cpe:/o:suse:packagehub:12">SUSE Package Hub 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-45.6.0-20.1">
      <FullProductName ProductID="MozillaThunderbird-45.6.0-20.1">MozillaThunderbird-45.6.0-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.6.0-20.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.6.0-20.1">MozillaThunderbird-buildsymbols-45.6.0-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.6.0-20.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.6.0-20.1">MozillaThunderbird-devel-45.6.0-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.6.0-20.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.6.0-20.1">MozillaThunderbird-translations-common-45.6.0-20.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.6.0-20.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.6.0-20.1">MozillaThunderbird-translations-other-45.6.0-20.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaThunderbird-45.6.0-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1">MozillaThunderbird-45.6.0-20.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-buildsymbols-45.6.0-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1">MozillaThunderbird-buildsymbols-45.6.0-20.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-devel-45.6.0-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1">MozillaThunderbird-devel-45.6.0-20.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-common-45.6.0-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1">MozillaThunderbird-translations-common-45.6.0-20.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaThunderbird-translations-other-45.6.0-20.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Package Hub 12">
      <FullProductName ProductID="SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1">MozillaThunderbird-translations-other-45.6.0-20.1 as a component of SUSE Package Hub 12</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9893.html</URL>
        <Description>CVE-2016-9893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9895</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9895.html</URL>
        <Description>CVE-2016-9895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9897</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9897.html</URL>
        <Description>CVE-2016-9897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9898</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9898.html</URL>
        <Description>CVE-2016-9898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9899</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9899.html</URL>
        <Description>CVE-2016-9899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9900</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9900.html</URL>
        <Description>CVE-2016-9900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9904</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9904.html</URL>
        <Description>CVE-2016-9904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9905</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-buildsymbols-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-devel-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-common-45.6.0-20.1</ProductID>
        <ProductID>SUSE Package Hub 12:MozillaThunderbird-translations-other-45.6.0-20.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9905.html</URL>
        <Description>CVE-2016-9905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
