<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaThunderbird</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2017:0026-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-01-04T17:39:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-01-04T17:39:26Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-01-04T17:39:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaThunderbird</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">   This update to Mozilla Thunderbird 45.6.0 fixes security issues and bugs.

   In general, these flaws cannot be exploited through email in Thunderbird
   because scripting is disabled when reading mail, but are potentially risks
   in browser or browser-like contexts.

   The following vulnerabilities were fixed: (boo#1015422)

   - CVE-2016-9899: Use-after-free while manipulating DOM events and audio
     elements
   - CVE-2016-9895: CSP bypass using marquee tag
   - CVE-2016-9897: Memory corruption in libGLES
   - CVE-2016-9898: Use-after-free in Editor while manipulating DOM subtrees
   - CVE-2016-9900: Restricted external resources can be loaded by SVG images
     through data URLs
   - CVE-2016-9904: Cross-origin information leak in shared atoms
   - CVE-2016-9905: Crash in EnumerateSubDocuments
   - CVE-2016-9893: Memory safety bugs fixed in Thunderbird 45.6

   The following bugs were fixed:

   - The system integration dialog was shown every time when starting
     Thunderbird
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      <Description>E-Mail link for openSUSE-SU-2017:0026-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaThunderbird-45.6.0-70.95.1">
      <FullProductName ProductID="MozillaThunderbird-45.6.0-70.95.1">MozillaThunderbird-45.6.0-70.95.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-buildsymbols-45.6.0-70.95.1">
      <FullProductName ProductID="MozillaThunderbird-buildsymbols-45.6.0-70.95.1">MozillaThunderbird-buildsymbols-45.6.0-70.95.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-devel-45.6.0-70.95.1">
      <FullProductName ProductID="MozillaThunderbird-devel-45.6.0-70.95.1">MozillaThunderbird-devel-45.6.0-70.95.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-common-45.6.0-70.95.1">
      <FullProductName ProductID="MozillaThunderbird-translations-common-45.6.0-70.95.1">MozillaThunderbird-translations-common-45.6.0-70.95.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaThunderbird-translations-other-45.6.0-70.95.1">
      <FullProductName ProductID="MozillaThunderbird-translations-other-45.6.0-70.95.1">MozillaThunderbird-translations-other-45.6.0-70.95.1</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Thunderbird 45.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9893</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9893.html</URL>
        <Description>CVE-2016-9893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Event handlers on "marquee" elements were executed despite a strict Content Security Policy (CSP) that disallowed inline JavaScript. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9895</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9895.html</URL>
        <Description>CVE-2016-9895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory corruption resulting in a potentially exploitable crash during WebGL functions using a vector constructor with a varying array within libGLES. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9897</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9897.html</URL>
        <Description>CVE-2016-9897</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free resulting in potentially exploitable crash when manipulating DOM subtrees in the Editor. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9898</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9898.html</URL>
        <Description>CVE-2016-9898</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free while manipulating DOM events and removing audio elements due to errors in the handling of node adoption. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9899</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9899.html</URL>
        <Description>CVE-2016-9899</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">External resources that should be blocked when loaded by SVG images can bypass security restrictions through the use of "data:" URLs. This could allow for cross-domain data leakage. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9900</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9900.html</URL>
        <Description>CVE-2016-9900</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An attacker could use a JavaScript Map/Set timing attack to determine whether an atom is used by another compartment/zone in specific contexts. This could be used to leak information, such as usernames embedded in JavaScript code, across websites. This vulnerability affects Firefox &lt; 50.1, Firefox ESR &lt; 45.6, and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9904</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9904.html</URL>
        <Description>CVE-2016-9904</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potentially exploitable crash in "EnumerateSubDocuments" while adding or removing sub-documents. This vulnerability affects Firefox ESR &lt; 45.6 and Thunderbird &lt; 45.6.</Note>
    </Notes>
    <CVE>CVE-2016-9905</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2017-01/msg00013.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-9905.html</URL>
        <Description>CVE-2016-9905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015422</URL>
        <Description>SUSE Bug 1015422</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015527</URL>
        <Description>SUSE Bug 1015527</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015528</URL>
        <Description>SUSE Bug 1015528</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015529</URL>
        <Description>SUSE Bug 1015529</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015530</URL>
        <Description>SUSE Bug 1015530</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015531</URL>
        <Description>SUSE Bug 1015531</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015533</URL>
        <Description>SUSE Bug 1015533</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015534</URL>
        <Description>SUSE Bug 1015534</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015535</URL>
        <Description>SUSE Bug 1015535</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015536</URL>
        <Description>SUSE Bug 1015536</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015537</URL>
        <Description>SUSE Bug 1015537</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015538</URL>
        <Description>SUSE Bug 1015538</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015540</URL>
        <Description>SUSE Bug 1015540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015541</URL>
        <Description>SUSE Bug 1015541</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1015542</URL>
        <Description>SUSE Bug 1015542</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
