<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, mozilla-nspr, mozilla-nss</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2015:1978-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-11-12T12:14:53Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-11-12T12:14:53Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-11-12T12:14:53Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, mozilla-nspr, mozilla-nss</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
This Mozilla Firefox, NSS and NSPR update fixes the following security
and non security issues.

- mozilla-nspr was updated to version 4.10.10 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7183
    (bmo#1205157)
    NSPR memory corruption issues

- mozilla-nss was updated to 3.19.2.1 (bsc#952810)
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182
    (bmo#1192028, bmo#1202868)
    NSS and NSPR memory corruption issues

- MozillaFirefox was updated to 38.4.0 ESR (bsc#952810)
  * MFSA 2015-116/CVE-2015-4513
    (bmo#1107011, bmo#1191942, bmo#1193038, bmo#1204580,
     bmo#1204669, bmo#1204700, bmo#1205707, bmo#1206564,
     bmo#1208665, bmo#1209471, bmo#1213979)
    Miscellaneous memory safety hazards (rv:42.0 / rv:38.4)
  * MFSA 2015-122/CVE-2015-7188
    (bmo#1199430)
    Trailing whitespace in IP address hostnames can bypass
    same-origin policy
  * MFSA 2015-123/CVE-2015-7189
    (bmo#1205900)
    Buffer overflow during image interactions in canvas
  * MFSA 2015-127/CVE-2015-7193
    (bmo#1210302)
    CORS preflight is bypassed when non-standard Content-Type
    headers are received
  * MFSA 2015-128/CVE-2015-7194
    (bmo#1211262)
    Memory corruption in libjar through zip files
  * MFSA 2015-130/CVE-2015-7196
    (bmo#1140616)
    JavaScript garbage collection crash with Java applet
  * MFSA 2015-131/CVE-2015-7198/CVE-2015-7199/CVE-2015-7200
    (bmo#1204061, bmo#1188010, bmo#1204155)
    Vulnerabilities found through code inspection
  * MFSA 2015-132/CVE-2015-7197
    (bmo#1204269)
    Mixed content WebSocket policy bypass through workers
  * MFSA 2015-133/CVE-2015-7181/CVE-2015-7182/CVE-2015-7183
    (bmo#1202868, bmo#1192028, bmo#1205157)
    NSS and NSPR memory corruption issues
- fix printing on landscape media (bsc#908275)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp2-firefox-20151104-12203</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      <Description>Link for SUSE-SU-2015:1978-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2015-November/001675.html</URL>
      <Description>E-Mail link for SUSE-SU-2015:1978-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/908275</URL>
      <Description>SUSE Bug 908275</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/952810</URL>
      <Description>SUSE Bug 952810</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4513/</URL>
      <Description>SUSE CVE CVE-2015-4513 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7181/</URL>
      <Description>SUSE CVE CVE-2015-7181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7182/</URL>
      <Description>SUSE CVE CVE-2015-7182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7183/</URL>
      <Description>SUSE CVE CVE-2015-7183 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7188/</URL>
      <Description>SUSE CVE CVE-2015-7188 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7189/</URL>
      <Description>SUSE CVE CVE-2015-7189 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7193/</URL>
      <Description>SUSE CVE CVE-2015-7193 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7194/</URL>
      <Description>SUSE CVE CVE-2015-7194 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7196/</URL>
      <Description>SUSE CVE CVE-2015-7196 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7197/</URL>
      <Description>SUSE CVE CVE-2015-7197 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7198/</URL>
      <Description>SUSE CVE CVE-2015-7198 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7199/</URL>
      <Description>SUSE CVE CVE-2015-7199 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7200/</URL>
      <Description>SUSE CVE CVE-2015-7200 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP2-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp2">SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-38.4.0esr-25.3">
      <FullProductName ProductID="MozillaFirefox-38.4.0esr-25.3">MozillaFirefox-38.4.0esr-25.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-SLED-38-12.19">
      <FullProductName ProductID="MozillaFirefox-branding-SLED-38-12.19">MozillaFirefox-branding-SLED-38-12.19</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-38.4.0esr-25.3">
      <FullProductName ProductID="MozillaFirefox-translations-38.4.0esr-25.3">MozillaFirefox-translations-38.4.0esr-25.3</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.19.2.1-12.1">
      <FullProductName ProductID="libfreebl3-3.19.2.1-12.1">libfreebl3-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.19.2.1-12.1">
      <FullProductName ProductID="libfreebl3-32bit-3.19.2.1-12.1">libfreebl3-32bit-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-4.10.10-16.1">
      <FullProductName ProductID="mozilla-nspr-4.10.10-16.1">mozilla-nspr-4.10.10-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-32bit-4.10.10-16.1">
      <FullProductName ProductID="mozilla-nspr-32bit-4.10.10-16.1">mozilla-nspr-32bit-4.10.10-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nspr-devel-4.10.10-16.1">
      <FullProductName ProductID="mozilla-nspr-devel-4.10.10-16.1">mozilla-nspr-devel-4.10.10-16.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.19.2.1-12.1">
      <FullProductName ProductID="mozilla-nss-3.19.2.1-12.1">mozilla-nss-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.19.2.1-12.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.19.2.1-12.1">mozilla-nss-32bit-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.19.2.1-12.1">
      <FullProductName ProductID="mozilla-nss-devel-3.19.2.1-12.1">mozilla-nss-devel-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.19.2.1-12.1">
      <FullProductName ProductID="mozilla-nss-tools-3.19.2.1-12.1">mozilla-nss-tools-3.19.2.1-12.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-38.4.0esr-25.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3">MozillaFirefox-38.4.0esr-25.3 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-SLED-38-12.19" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19">MozillaFirefox-branding-SLED-38-12.19 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-38.4.0esr-25.3" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3">MozillaFirefox-translations-38.4.0esr-25.3 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1">libfreebl3-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1">libfreebl3-32bit-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-4.10.10-16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1">mozilla-nspr-4.10.10-16.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-32bit-4.10.10-16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1">mozilla-nspr-32bit-4.10.10-16.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nspr-devel-4.10.10-16.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1">mozilla-nspr-devel-4.10.10-16.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1">mozilla-nss-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1">mozilla-nss-32bit-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1">mozilla-nss-devel-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.19.2.1-12.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP2-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1">mozilla-nss-tools-3.19.2.1-12.1 as a component of SUSE Linux Enterprise Server 11 SP2-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2015-4513</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4513.html</URL>
        <Description>CVE-2015-4513</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.</Note>
    </Notes>
    <CVE>CVE-2015-7181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7181.html</URL>
        <Description>CVE-2015-7181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.</Note>
    </Notes>
    <CVE>CVE-2015-7182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7182.html</URL>
        <Description>CVE-2015-7182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.</Note>
    </Notes>
    <CVE>CVE-2015-7183</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7183.html</URL>
        <Description>CVE-2015-7183</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962977</URL>
        <Description>SUSE Bug 962977</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allow remote attackers to bypass the Same Origin Policy for an IP address origin, and conduct cross-site scripting (XSS) attacks, by appending whitespace characters to an IP address string.</Note>
    </Notes>
    <CVE>CVE-2015-7188</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7188.html</URL>
        <Description>CVE-2015-7188</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in the JPEGEncoder function in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to execute arbitrary code or cause a denial of service (heap-based buffer overflow) via vectors involving a CANVAS element and crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2015-7189</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7189.html</URL>
        <Description>CVE-2015-7189</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly follow the CORS cross-origin request algorithm for the POST method in situations involving an unspecified Content-Type header manipulation, which allows remote attackers to bypass the Same Origin Policy by leveraging the lack of a preflight-request step.</Note>
    </Notes>
    <CVE>CVE-2015-7193</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7193.html</URL>
        <Description>CVE-2015-7193</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer underflow in libjar in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted ZIP archive.</Note>
    </Notes>
    <CVE>CVE-2015-7194</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7194.html</URL>
        <Description>CVE-2015-7194</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, when a Java plugin is enabled, allow remote attackers to cause a denial of service (incorrect garbage collection and application crash) or possibly execute arbitrary code via a crafted Java applet that deallocates an in-use JavaScript wrapper.</Note>
    </Notes>
    <CVE>CVE-2015-7196</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7196.html</URL>
        <Description>CVE-2015-7196</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 improperly control the ability of a web worker to create a WebSocket object, which allows remote attackers to bypass intended mixed-content restrictions via crafted JavaScript code.</Note>
    </Notes>
    <CVE>CVE-2015-7197</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7197.html</URL>
        <Description>CVE-2015-7197</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Buffer overflow in the rx::TextureStorage11 class in ANGLE, as used in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4, allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via crafted texture data.</Note>
    </Notes>
    <CVE>CVE-2015-7198</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7198.html</URL>
        <Description>CVE-2015-7198</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The (1) AddWeightedPathSegLists and (2) SVGPathSegListSMILType::Interpolate functions in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lack status checking, which allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via a crafted SVG document.</Note>
    </Notes>
    <CVE>CVE-2015-7199</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7199.html</URL>
        <Description>CVE-2015-7199</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CryptoKey interface implementation in Mozilla Firefox before 42.0 and Firefox ESR 38.x before 38.4 lacks status checking, which allows attackers to have an unspecified impact via vectors related to a cryptographic key.</Note>
    </Notes>
    <CVE>CVE-2015-7200</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-branding-SLED-38-12.19</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:MozillaFirefox-translations-38.4.0esr-25.3</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:libfreebl3-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-32bit-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nspr-devel-4.10.10-16.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-32bit-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-devel-3.19.2.1-12.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP2-LTSS:mozilla-nss-tools-3.19.2.1-12.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2015/suse-su-20151978-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7200.html</URL>
        <Description>CVE-2015-7200</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
