<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">libfreebl3-3.26.2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2024:10451</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2024-06-17T21:45:33Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2024-06-17T21:45:33Z</InitialReleaseDate>
    <CurrentReleaseDate>2024-06-17T21:45:33Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">libfreebl3-3.26.2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the libfreebl3-3.26.2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2024-10451</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL/>
      <Description>E-Mail link for openSUSE-SU-2024:10451</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2010-3170/</URL>
      <Description>SUSE CVE CVE-2010-3170 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3389/</URL>
      <Description>SUSE CVE CVE-2011-3389 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2011-3640/</URL>
      <Description>SUSE CVE CVE-2011-3640 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0743/</URL>
      <Description>SUSE CVE CVE-2013-0743 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-0791/</URL>
      <Description>SUSE CVE CVE-2013-0791 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1620/</URL>
      <Description>SUSE CVE CVE-2013-1620 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1739/</URL>
      <Description>SUSE CVE CVE-2013-1739 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-1740/</URL>
      <Description>SUSE CVE CVE-2013-1740 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2013-5605/</URL>
      <Description>SUSE CVE CVE-2013-5605 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1490/</URL>
      <Description>SUSE CVE CVE-2014-1490 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1491/</URL>
      <Description>SUSE CVE CVE-2014-1491 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1492/</URL>
      <Description>SUSE CVE CVE-2014-1492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1568/</URL>
      <Description>SUSE CVE CVE-2014-1568 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2014-1569/</URL>
      <Description>SUSE CVE CVE-2014-1569 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-2721/</URL>
      <Description>SUSE CVE CVE-2015-2721 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-4000/</URL>
      <Description>SUSE CVE CVE-2015-4000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7181/</URL>
      <Description>SUSE CVE CVE-2015-7181 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7182/</URL>
      <Description>SUSE CVE CVE-2015-7182 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2015-7575/</URL>
      <Description>SUSE CVE CVE-2015-7575 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1950/</URL>
      <Description>SUSE CVE CVE-2016-1950 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-1979/</URL>
      <Description>SUSE CVE CVE-2016-1979 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2016-2834/</URL>
      <Description>SUSE CVE CVE-2016-2834 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-3.26.2-1.1">
      <FullProductName ProductID="libfreebl3-3.26.2-1.1">libfreebl3-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libfreebl3-32bit-3.26.2-1.1">
      <FullProductName ProductID="libfreebl3-32bit-3.26.2-1.1">libfreebl3-32bit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-3.26.2-1.1">
      <FullProductName ProductID="libsoftokn3-3.26.2-1.1">libsoftokn3-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libsoftokn3-32bit-3.26.2-1.1">
      <FullProductName ProductID="libsoftokn3-32bit-3.26.2-1.1">libsoftokn3-32bit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-3.26.2-1.1">mozilla-nss-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-32bit-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-32bit-3.26.2-1.1">mozilla-nss-32bit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-certs-3.26.2-1.1">mozilla-nss-certs-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-certs-32bit-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-certs-32bit-3.26.2-1.1">mozilla-nss-certs-32bit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-devel-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-devel-3.26.2-1.1">mozilla-nss-devel-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-sysinit-3.26.2-1.1">mozilla-nss-sysinit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-sysinit-32bit-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-sysinit-32bit-3.26.2-1.1">mozilla-nss-sysinit-32bit-3.26.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="mozilla-nss-tools-3.26.2-1.1">
      <FullProductName ProductID="mozilla-nss-tools-3.26.2-1.1">mozilla-nss-tools-3.26.2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libfreebl3-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreebl3-3.26.2-1.1">libfreebl3-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libfreebl3-32bit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1">libfreebl3-32bit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1">libsoftokn3-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="libsoftokn3-32bit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1">libsoftokn3-32bit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1">mozilla-nss-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-32bit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1">mozilla-nss-32bit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1">mozilla-nss-certs-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-certs-32bit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1">mozilla-nss-certs-32bit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-devel-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1">mozilla-nss-devel-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1">mozilla-nss-sysinit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-sysinit-32bit-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1">mozilla-nss-sysinit-32bit-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="mozilla-nss-tools-3.26.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1">mozilla-nss-tools-3.26.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Firefox before 3.5.14 and 3.6.x before 3.6.11, Thunderbird before 3.0.9 and 3.1.x before 3.1.5, and SeaMonkey before 2.0.9 recognize a wildcard IP address in the subject's Common Name field of an X.509 certificate, which might allow man-in-the-middle attackers to spoof arbitrary SSL servers via a crafted certificate issued by a legitimate Certification Authority.</Note>
    </Notes>
    <CVE>CVE-2010-3170</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2010-3170.html</URL>
        <Description>CVE-2010-3170</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/637290</URL>
        <Description>SUSE Bug 637290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/645315</URL>
        <Description>SUSE Bug 645315</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/652858</URL>
        <Description>SUSE Bug 652858</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/868629</URL>
        <Description>SUSE Bug 868629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The SSL protocol, as used in certain configurations in Microsoft Windows and Microsoft Internet Explorer, Mozilla Firefox, Google Chrome, Opera, and other products, encrypts data by using CBC mode with chained initialization vectors, which allows man-in-the-middle attackers to obtain plaintext HTTP headers via a blockwise chosen-boundary attack (BCBA) on an HTTPS session, in conjunction with JavaScript code that uses (1) the HTML5 WebSocket API, (2) the Java URLConnection API, or (3) the Silverlight WebClient API, aka a "BEAST" attack.</Note>
    </Notes>
    <CVE>CVE-2011-3389</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3389.html</URL>
        <Description>CVE-2011-3389</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/716002</URL>
        <Description>SUSE Bug 716002</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/719047</URL>
        <Description>SUSE Bug 719047</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/725167</URL>
        <Description>SUSE Bug 725167</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726096</URL>
        <Description>SUSE Bug 726096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739248</URL>
        <Description>SUSE Bug 739248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/739256</URL>
        <Description>SUSE Bug 739256</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/742306</URL>
        <Description>SUSE Bug 742306</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/751718</URL>
        <Description>SUSE Bug 751718</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/759666</URL>
        <Description>SUSE Bug 759666</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/763598</URL>
        <Description>SUSE Bug 763598</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/814655</URL>
        <Description>SUSE Bug 814655</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** DISPUTED ** Untrusted search path vulnerability in Mozilla Network Security Services (NSS), as used in Google Chrome before 17 on Windows and Mac OS X, might allow local users to gain privileges via a Trojan horse pkcs11.txt file in a top-level directory. NOTE: the vendor's response was "Strange behavior, but we're not treating this as a security bug."</Note>
    </Notes>
    <CVE>CVE-2011-3640</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2011-3640.html</URL>
        <Description>CVE-2011-3640</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/726096</URL>
        <Description>SUSE Bug 726096</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">** REJECT **  DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: none.  Reason: This candidate was withdrawn by its CNA at the suggestion of the CVE project team.  The candidate had been associated with a correct report of a security problem, but not a problem that is categorized as a vulnerability within CVE.  Compromised or unauthorized SSL certificates are not within CVE's scope.  Notes: none.</Note>
    </Notes>
    <CVE>CVE-2013-0743</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0743.html</URL>
        <Description>CVE-2013-0743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/796895</URL>
        <Description>SUSE Bug 796895</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The CERT_DecodeCertPackage function in Mozilla Network Security Services (NSS), as used in Mozilla Firefox before 20.0, Firefox ESR 17.x before 17.0.5, Thunderbird before 17.0.5, Thunderbird ESR 17.x before 17.0.5, SeaMonkey before 2.17, and other products, allows remote attackers to cause a denial of service (out-of-bounds read and memory corruption) via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2013-0791</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-0791.html</URL>
        <Description>CVE-2013-0791</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/813026</URL>
        <Description>SUSE Bug 813026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/819204</URL>
        <Description>SUSE Bug 819204</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS implementation in Mozilla Network Security Services (NSS) does not properly consider timing side-channel attacks on a noncompliant MAC check operation during the processing of malformed CBC padding, which allows remote attackers to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data for crafted packets, a related issue to CVE-2013-0169.</Note>
    </Notes>
    <CVE>CVE-2013-1620</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1620.html</URL>
        <Description>CVE-2013-1620</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/802184</URL>
        <Description>SUSE Bug 802184</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.15.2 does not ensure that data structures are initialized before read operations, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger a decryption failure.</Note>
    </Notes>
    <CVE>CVE-2013-1739</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1739.html</URL>
        <Description>CVE-2013-1739</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/842979</URL>
        <Description>SUSE Bug 842979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/847708</URL>
        <Description>SUSE Bug 847708</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.</Note>
    </Notes>
    <CVE>CVE-2013-1740</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-1740.html</URL>
        <Description>CVE-2013-1740</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/859055</URL>
        <Description>SUSE Bug 859055</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.</Note>
    </Notes>
    <CVE>CVE-2013-5605</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2013-5605.html</URL>
        <Description>CVE-2013-5605</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/850148</URL>
        <Description>SUSE Bug 850148</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.</Note>
    </Notes>
    <CVE>CVE-2014-1490</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1490.html</URL>
        <Description>CVE-2014-1490</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861847</URL>
        <Description>SUSE Bug 861847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862300</URL>
        <Description>SUSE Bug 862300</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.</Note>
    </Notes>
    <CVE>CVE-2014-1491</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1491.html</URL>
        <Description>CVE-2014-1491</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/861847</URL>
        <Description>SUSE Bug 861847</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/862289</URL>
        <Description>SUSE Bug 862289</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The cert_TestHostName function in lib/certdb/certdb.c in the certificate-checking implementation in Mozilla Network Security Services (NSS) before 3.16 accepts a wildcard character that is embedded in an internationalized domain name's U-label, which might allow man-in-the-middle attackers to spoof SSL servers via a crafted certificate.</Note>
    </Notes>
    <CVE>CVE-2014-1492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1492.html</URL>
        <Description>CVE-2014-1492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/869827</URL>
        <Description>SUSE Bug 869827</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/926974</URL>
        <Description>SUSE Bug 926974</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.16.2.1, 3.16.x before 3.16.5, and 3.17.x before 3.17.1, as used in Mozilla Firefox before 32.0.3, Mozilla Firefox ESR 24.x before 24.8.1 and 31.x before 31.1.1, Mozilla Thunderbird before 24.8.1 and 31.x before 31.1.2, Mozilla SeaMonkey before 2.29.1, Google Chrome before 37.0.2062.124 on Windows and OS X, and Google Chrome OS before 37.0.2062.120, does not properly parse ASN.1 values in X.509 certificates, which makes it easier for remote attackers to spoof RSA signatures via a crafted certificate, aka a "signature malleability" issue.</Note>
    </Notes>
    <CVE>CVE-2014-1568</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1568.html</URL>
        <Description>CVE-2014-1568</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1107874</URL>
        <Description>SUSE Bug 1107874</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/897890</URL>
        <Description>SUSE Bug 897890</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/898959</URL>
        <Description>SUSE Bug 898959</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.</Note>
    </Notes>
    <CVE>CVE-2014-1569</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2014-1569.html</URL>
        <Description>CVE-2014-1569</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/910647</URL>
        <Description>SUSE Bug 910647</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/913096</URL>
        <Description>SUSE Bug 913096</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/917597</URL>
        <Description>SUSE Bug 917597</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.19, as used in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, Thunderbird before 38.1, and other products, does not properly determine state transitions for the TLS state machine, which allows man-in-the-middle attackers to defeat cryptographic protection mechanisms by blocking messages, as demonstrated by removing a forward-secrecy property by blocking a ServerKeyExchange message, aka a "SMACK SKIP-TLS" issue.</Note>
    </Notes>
    <CVE>CVE-2015-2721</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-2721.html</URL>
        <Description>CVE-2015-2721</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the "Logjam" issue.</Note>
    </Notes>
    <CVE>CVE-2015-4000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>7.3</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:C/I:C/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4000.html</URL>
        <Description>CVE-2015-4000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1074631</URL>
        <Description>SUSE Bug 1074631</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1211968</URL>
        <Description>SUSE Bug 1211968</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931600</URL>
        <Description>SUSE Bug 931600</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931698</URL>
        <Description>SUSE Bug 931698</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931723</URL>
        <Description>SUSE Bug 931723</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/931845</URL>
        <Description>SUSE Bug 931845</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932026</URL>
        <Description>SUSE Bug 932026</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/932483</URL>
        <Description>SUSE Bug 932483</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/934789</URL>
        <Description>SUSE Bug 934789</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935033</URL>
        <Description>SUSE Bug 935033</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935540</URL>
        <Description>SUSE Bug 935540</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/935979</URL>
        <Description>SUSE Bug 935979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937202</URL>
        <Description>SUSE Bug 937202</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/937766</URL>
        <Description>SUSE Bug 937766</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938248</URL>
        <Description>SUSE Bug 938248</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938432</URL>
        <Description>SUSE Bug 938432</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938895</URL>
        <Description>SUSE Bug 938895</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938905</URL>
        <Description>SUSE Bug 938905</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938906</URL>
        <Description>SUSE Bug 938906</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938913</URL>
        <Description>SUSE Bug 938913</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/938945</URL>
        <Description>SUSE Bug 938945</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943664</URL>
        <Description>SUSE Bug 943664</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/944729</URL>
        <Description>SUSE Bug 944729</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/945582</URL>
        <Description>SUSE Bug 945582</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/955589</URL>
        <Description>SUSE Bug 955589</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/980406</URL>
        <Description>SUSE Bug 980406</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/990592</URL>
        <Description>SUSE Bug 990592</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/994144</URL>
        <Description>SUSE Bug 994144</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.</Note>
    </Notes>
    <CVE>CVE-2015-7181</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7181.html</URL>
        <Description>CVE-2015-7181</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.</Note>
    </Notes>
    <CVE>CVE-2015-7182</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7182.html</URL>
        <Description>CVE-2015-7182</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/952810</URL>
        <Description>SUSE Bug 952810</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.</Note>
    </Notes>
    <CVE>CVE-2015-7575</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-7575.html</URL>
        <Description>CVE-2015-7575</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/959888</URL>
        <Description>SUSE Bug 959888</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960402</URL>
        <Description>SUSE Bug 960402</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/960996</URL>
        <Description>SUSE Bug 960996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961280</URL>
        <Description>SUSE Bug 961280</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961281</URL>
        <Description>SUSE Bug 961281</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961282</URL>
        <Description>SUSE Bug 961282</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961283</URL>
        <Description>SUSE Bug 961283</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961284</URL>
        <Description>SUSE Bug 961284</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961290</URL>
        <Description>SUSE Bug 961290</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/961357</URL>
        <Description>SUSE Bug 961357</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/962743</URL>
        <Description>SUSE Bug 962743</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/963937</URL>
        <Description>SUSE Bug 963937</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/967521</URL>
        <Description>SUSE Bug 967521</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/981087</URL>
        <Description>SUSE Bug 981087</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Heap-based buffer overflow in Mozilla Network Security Services (NSS) before 3.19.2.3 and 3.20.x and 3.21.x before 3.21.1, as used in Mozilla Firefox before 45.0 and Firefox ESR 38.x before 38.7, allows remote attackers to execute arbitrary code via crafted ASN.1 data in an X.509 certificate.</Note>
    </Notes>
    <CVE>CVE-2016-1950</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1950.html</URL>
        <Description>CVE-2016-1950</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969894</URL>
        <Description>SUSE Bug 969894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970257</URL>
        <Description>SUSE Bug 970257</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970377</URL>
        <Description>SUSE Bug 970377</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970378</URL>
        <Description>SUSE Bug 970378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970379</URL>
        <Description>SUSE Bug 970379</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970380</URL>
        <Description>SUSE Bug 970380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970381</URL>
        <Description>SUSE Bug 970381</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970431</URL>
        <Description>SUSE Bug 970431</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/970433</URL>
        <Description>SUSE Bug 970433</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="21">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the PK11_ImportDERPrivateKeyInfoAndReturnKey function in Mozilla Network Security Services (NSS) before 3.21.1, as used in Mozilla Firefox before 45.0, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted key data with DER encoding.</Note>
    </Notes>
    <CVE>CVE-2016-1979</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-1979.html</URL>
        <Description>CVE-2016-1979</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/969894</URL>
        <Description>SUSE Bug 969894</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="22">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.</Note>
    </Notes>
    <CVE>CVE-2016-2834</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:libfreebl3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libfreebl3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:libsoftokn3-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-devel-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.26.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:mozilla-nss-tools-3.26.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2016-2834.html</URL>
        <Description>CVE-2016-2834</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983549</URL>
        <Description>SUSE Bug 983549</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/983639</URL>
        <Description>SUSE Bug 983639</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
