<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2016:2195-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2016-08-30T13:18:52Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2016-08-30T13:18:52Z</InitialReleaseDate>
    <CurrentReleaseDate>2016-08-30T13:18:52Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MozillaFirefox was updated to 45.3.0 ESR to fix the following issues
(bsc#991809):

* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836
  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)
* MFSA 2016-63/CVE-2016-2830
  Favicon network connection can persist when page is closed
* MFSA 2016-64/CVE-2016-2838
  Buffer overflow rendering SVG with bidirectional content
* MFSA 2016-65/CVE-2016-2839
  Cairo rendering crash due to memory allocation issue with
  FFmpeg 0.10
* MFSA 2016-67/CVE-2016-5252
  Stack underflow during 2D graphics rendering
* MFSA 2016-70/CVE-2016-5254
  Use-after-free when using alt key and toplevel menus
* MFSA 2016-72/CVE-2016-5258
  Use-after-free in DTLS during WebRTC session shutdown
* MFSA 2016-73/CVE-2016-5259
  Use-after-free in service workers with nested sync events
* MFSA 2016-76/CVE-2016-5262
  Scripts on marquee tag can execute in sandboxed iframes
* MFSA 2016-77/CVE-2016-2837
  Buffer overflow in ClearKey Content Decryption Module (CDM)
  during video playback
* MFSA 2016-78/CVE-2016-5263
  Type confusion in display transformation
* MFSA 2016-79/CVE-2016-5264
  Use-after-free when applying SVG effects
* MFSA 2016-80/CVE-2016-5265
  Same-origin policy violation using local HTML file and saved
  shortcut file
* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)

Also a temporary workaround was added:
- Temporarily bind Firefox to the first CPU as a hotfix
  for an apparent race condition (bsc#989196, bsc#990628)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">sdksp4-MozillaFirefox-12722,sleclo50sp3-MozillaFirefox-12722,sleman21-MozillaFirefox-12722,slemap21-MozillaFirefox-12722,sleposp3-MozillaFirefox-12722,slessp3-MozillaFirefox-12722,slessp4-MozillaFirefox-12722</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      <Description>Link for SUSE-SU-2016:2195-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2016-August/002245.html</URL>
      <Description>E-Mail link for SUSE-SU-2016:2195-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/989196</URL>
      <Description>SUSE Bug 989196</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990628</URL>
      <Description>SUSE Bug 990628</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/990856</URL>
      <Description>SUSE Bug 990856</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/991809</URL>
      <Description>SUSE Bug 991809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2830/</URL>
      <Description>SUSE CVE CVE-2016-2830 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2835/</URL>
      <Description>SUSE CVE CVE-2016-2835 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2836/</URL>
      <Description>SUSE CVE CVE-2016-2836 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2837/</URL>
      <Description>SUSE CVE CVE-2016-2837 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2838/</URL>
      <Description>SUSE CVE CVE-2016-2838 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2839/</URL>
      <Description>SUSE CVE CVE-2016-2839 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5252/</URL>
      <Description>SUSE CVE CVE-2016-5252 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5254/</URL>
      <Description>SUSE CVE CVE-2016-5254 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5258/</URL>
      <Description>SUSE CVE CVE-2016-5258 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5259/</URL>
      <Description>SUSE CVE CVE-2016-5259 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5262/</URL>
      <Description>SUSE CVE CVE-2016-5262 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5263/</URL>
      <Description>SUSE CVE CVE-2016-5263 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5264/</URL>
      <Description>SUSE CVE CVE-2016-5264 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-5265/</URL>
      <Description>SUSE CVE CVE-2016-5265 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-6354/</URL>
      <Description>SUSE CVE CVE-2016-6354 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Point of Sale 11 SP3">
        <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3" CPE="cpe:/o:suse:sle-pos:11:sp3">SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS" CPE="cpe:/o:suse:suse_sles_ltss:11:sp3">SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP3-TERADATA">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA" CPE="cpe:/o:suse:sles:11:sp3:teradata">SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4" CPE="cpe:/o:suse:sles_sap:11:sp4">SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 11 SP4">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4" CPE="cpe:/a:suse:sle-sdk:11:sp4">SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager 2.1">
      <Branch Type="Product Name" Name="SUSE Manager 2.1">
        <FullProductName ProductID="SUSE Manager 2.1" CPE="cpe:/o:suse:suse-manager-server:2.1">SUSE Manager 2.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Manager Proxy 2.1">
      <Branch Type="Product Name" Name="SUSE Manager Proxy 2.1">
        <FullProductName ProductID="SUSE Manager Proxy 2.1" CPE="cpe:/o:suse:suse-manager-proxy:2.1">SUSE Manager Proxy 2.1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE OpenStack Cloud 5">
      <Branch Type="Product Name" Name="SUSE OpenStack Cloud 5">
        <FullProductName ProductID="SUSE OpenStack Cloud 5" CPE="cpe:/o:suse:cloud:5">SUSE OpenStack Cloud 5</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-45.3.0esr-50.1">
      <FullProductName ProductID="MozillaFirefox-devel-45.3.0esr-50.1">MozillaFirefox-devel-45.3.0esr-50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-45.3.0esr-50.1">
      <FullProductName ProductID="MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-45.3.0esr-50.1">
      <FullProductName ProductID="MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Point of Sale 11 SP3">
      <FullProductName ProductID="SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Point of Sale 11 SP3</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP3-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP3-TERADATA">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP3-TERADATA</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Server for SAP Applications 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 11 SP4">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1">MozillaFirefox-devel-45.3.0esr-50.1 as a component of SUSE Linux Enterprise Software Development Kit 11 SP4</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 2.1">
      <FullProductName ProductID="SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Manager 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager 2.1">
      <FullProductName ProductID="SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Manager 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 2.1">
      <FullProductName ProductID="SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE Manager Proxy 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Manager Proxy 2.1">
      <FullProductName ProductID="SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE Manager Proxy 2.1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 5">
      <FullProductName ProductID="SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1">MozillaFirefox-45.3.0esr-50.1 as a component of SUSE OpenStack Cloud 5</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.3.0esr-50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE OpenStack Cloud 5">
      <FullProductName ProductID="SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1">MozillaFirefox-translations-45.3.0esr-50.1 as a component of SUSE OpenStack Cloud 5</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.</Note>
    </Notes>
    <CVE>CVE-2016-2830</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2830.html</URL>
        <Description>CVE-2016-2830</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983922</URL>
        <Description>SUSE Bug 983922</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2835</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2835.html</URL>
        <Description>CVE-2016-2835</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to Http2Session::Shutdown and SpdySession31::Shutdown, and other vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2836</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2836.html</URL>
        <Description>CVE-2016-2836</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the ClearKey Content Decryption Module (CDM) in the Encrypted Media Extensions (EME) API in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 might allow remote attackers to execute arbitrary code by providing a malformed video and leveraging a Gecko Media Plugin (GMP) sandbox bypass.</Note>
    </Notes>
    <CVE>CVE-2016-2837</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2837.html</URL>
        <Description>CVE-2016-2837</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the nsBidi::BracketData::AddOpening function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via directional content in an SVG document.</Note>
    </Notes>
    <CVE>CVE-2016-2838</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2838.html</URL>
        <Description>CVE-2016-2838</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 on Linux make cairo _cairo_surface_get_extents calls that do not properly interact with libav header allocation in FFmpeg 0.10, which allows remote attackers to cause a denial of service (application crash) via a crafted video.</Note>
    </Notes>
    <CVE>CVE-2016-2839</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2839.html</URL>
        <Description>CVE-2016-2839</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Stack-based buffer underflow in the mozilla::gfx::BasePoint4d function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via crafted two-dimensional graphics data that is mishandled during clipping-region calculations.</Note>
    </Notes>
    <CVE>CVE-2016-5252</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5252.html</URL>
        <Description>CVE-2016-5252</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsXULPopupManager::KeyDown function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) by leveraging keyboard access to use the Alt key during selection of top-level menu items.</Note>
    </Notes>
    <CVE>CVE-2016-5254</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5254.html</URL>
        <Description>CVE-2016-5254</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the WebRTC socket thread in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code by leveraging incorrect free operations on DTLS objects during the shutdown of a WebRTC session.</Note>
    </Notes>
    <CVE>CVE-2016-5258</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5258.html</URL>
        <Description>CVE-2016-5258</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code via a script that closes its own Service Worker within a nested sync event loop.</Note>
    </Notes>
    <CVE>CVE-2016-5259</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5259.html</URL>
        <Description>CVE-2016-5259</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 process JavaScript event-handler attributes of a MARQUEE element within a sandboxed IFRAME element that lacks the sandbox="allow-scripts" attribute value, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted web site.</Note>
    </Notes>
    <CVE>CVE-2016-5262</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5262.html</URL>
        <Description>CVE-2016-5262</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The nsDisplayList::HitTest function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 mishandles rendering display transformation, which allows remote attackers to execute arbitrary code via a crafted web site that leverages "type confusion."</Note>
    </Notes>
    <CVE>CVE-2016-5263</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5263.html</URL>
        <Description>CVE-2016-5263</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the nsNodeUtils::NativeAnonymousChildListChange function in Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via an SVG element that is mishandled during effect application.</Note>
    </Notes>
    <CVE>CVE-2016-5264</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5264.html</URL>
        <Description>CVE-2016-5264</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 allow user-assisted remote attackers to bypass the Same Origin Policy, and conduct Universal XSS (UXSS) attacks or read arbitrary files, by arranging for the presence of a crafted HTML document and a crafted shortcut file in the same local directory.</Note>
    </Notes>
    <CVE>CVE-2016-5265</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-5265.html</URL>
        <Description>CVE-2016-5265</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/991809</URL>
        <Description>SUSE Bug 991809</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.</Note>
    </Notes>
    <CVE>CVE-2016-6354</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Point of Sale 11 SP3:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-LTSS:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP3-TERADATA:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 11 SP4:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 11 SP4:MozillaFirefox-devel-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE Manager Proxy 2.1:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-45.3.0esr-50.1</ProductID>
        <ProductID>SUSE OpenStack Cloud 5:MozillaFirefox-translations-45.3.0esr-50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>1.9</BaseScore>
        <Vector>AV:L/AC:M/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2016/suse-su-20162195-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-6354.html</URL>
        <Description>CVE-2016-6354</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1026047</URL>
        <Description>SUSE Bug 1026047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1035082</URL>
        <Description>SUSE Bug 1035082</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1035209</URL>
        <Description>SUSE Bug 1035209</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990856</URL>
        <Description>SUSE Bug 990856</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
