<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2017:0427-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2017-02-08T21:51:54Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2017-02-08T21:51:54Z</InitialReleaseDate>
    <CurrentReleaseDate>2017-02-08T21:51:54Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">
MozillaFirefox 45 ESR was updated to 45.7 to fix the following issues (bsc#1021991):

* MFSA 2017-02/CVE-2017-5378: Pointer and frame data leakage of Javascript objects (bsc#1021818)
* MFSA 2017-02/CVE-2017-5396: Use-after-free with Media Decoder (bsc#1021821)
* MFSA 2017-02/CVE-2017-5386: WebExtensions can use data: protocol to affect other extensions (bsc#1021823)
* MFSA 2017-02/CVE-2017-5380: Potential use-after-free during DOM manipulations (bsc#1021819)
* MFSA 2017-02/CVE-2017-5390: Insecure communication methods in Developer Tools JSON viewer (bsc#1021820)
* MFSA 2017-02/CVE-2017-5373: Memory safety bugs fixed in Firefox 51 and Firefox ESR 45.7 (bsc#1021824)
* MFSA 2017-02/CVE-2017-5375: Excessive JIT code allocation allows bypass of ASLR and DEP (bsc#1021814)
* MFSA 2017-02/CVE-2017-5376: Use-after-free in XSL (bsc#1021817)
* MFSA 2017-02/CVE-2017-5383: Location bar spoofing with unicode characters (bsc#1021822)

Please see https://www.mozilla.org/en-US/security/advisories/mfsa2017-02/
for more information.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">SUSE-SLE-DESKTOP-12-SP1-2017-217,SUSE-SLE-DESKTOP-12-SP2-2017-217,SUSE-SLE-RPI-12-SP2-2017-217,SUSE-SLE-SAP-12-2017-217,SUSE-SLE-SDK-12-SP1-2017-217,SUSE-SLE-SDK-12-SP2-2017-217,SUSE-SLE-SERVER-12-2017-217,SUSE-SLE-SERVER-12-SP1-2017-217,SUSE-SLE-SERVER-12-SP2-2017-217</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      <Description>Link for SUSE-SU-2017:0427-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2017-February/002633.html</URL>
      <Description>E-Mail link for SUSE-SU-2017:0427-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021814</URL>
      <Description>SUSE Bug 1021814</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021817</URL>
      <Description>SUSE Bug 1021817</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021818</URL>
      <Description>SUSE Bug 1021818</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021819</URL>
      <Description>SUSE Bug 1021819</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021820</URL>
      <Description>SUSE Bug 1021820</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021821</URL>
      <Description>SUSE Bug 1021821</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021822</URL>
      <Description>SUSE Bug 1021822</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021823</URL>
      <Description>SUSE Bug 1021823</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021824</URL>
      <Description>SUSE Bug 1021824</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1021991</URL>
      <Description>SUSE Bug 1021991</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5373/</URL>
      <Description>SUSE CVE CVE-2017-5373 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5375/</URL>
      <Description>SUSE CVE CVE-2017-5375 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5376/</URL>
      <Description>SUSE CVE CVE-2017-5376 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5378/</URL>
      <Description>SUSE CVE CVE-2017-5378 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5380/</URL>
      <Description>SUSE CVE CVE-2017-5380 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5383/</URL>
      <Description>SUSE CVE CVE-2017-5383 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5386/</URL>
      <Description>SUSE CVE CVE-2017-5386 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5390/</URL>
      <Description>SUSE CVE CVE-2017-5390 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2017-5396/</URL>
      <Description>SUSE CVE CVE-2017-5396 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1" CPE="cpe:/o:suse:sled:12:sp1">SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Desktop 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Desktop 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2" CPE="cpe:/o:suse:sled:12:sp2">SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1" CPE="cpe:/o:suse:sles:12:sp1">SUSE Linux Enterprise Server 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 12-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 12-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS" CPE="cpe:/o:suse:sles-ltss:12">SUSE Linux Enterprise Server 12-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2" CPE="cpe:/o:suse:sles:12:sp2">SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12" CPE="cpe:/o:suse:sles_sap:12">SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1" CPE="cpe:/o:suse:sles_sap:12:sp1">SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2" CPE="cpe:/o:suse:sles_sap:12:sp2">SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP1">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP1">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP1" CPE="cpe:/o:suse:sle-sdk:12:sp1">SUSE Linux Enterprise Software Development Kit 12 SP1</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Software Development Kit 12 SP2">
        <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2" CPE="cpe:/o:suse:sle-sdk:12:sp2">SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-45.7.0esr-99.1">
      <FullProductName ProductID="MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-45.7.0esr-99.1">
      <FullProductName ProductID="MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-45.7.0esr-99.1">
      <FullProductName ProductID="MozillaFirefox-devel-45.7.0esr-99.1">MozillaFirefox-devel-45.7.0esr-99.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Desktop 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Desktop 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Desktop 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 12-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server 12-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for Raspberry Pi 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1">MozillaFirefox-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server for SAP Applications 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1">MozillaFirefox-translations-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Server for SAP Applications 12 SP2</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP1">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1">MozillaFirefox-devel-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP1</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-devel-45.7.0esr-99.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Software Development Kit 12 SP2">
      <FullProductName ProductID="SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1">MozillaFirefox-devel-45.7.0esr-99.1 as a component of SUSE Linux Enterprise Software Development Kit 12 SP2</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Memory safety bugs were reported in Firefox 50.1 and Firefox ESR 45.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5373</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5373.html</URL>
        <Description>CVE-2017-5373</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021824</URL>
        <Description>SUSE Bug 1021824</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">JIT code allocation can allow for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5375</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5375.html</URL>
        <Description>CVE-2017-5375</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021814</URL>
        <Description>SUSE Bug 1021814</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free while manipulating XSL in XSLT documents. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5376</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5376.html</URL>
        <Description>CVE-2017-5376</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021817</URL>
        <Description>SUSE Bug 1021817</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Hashed codes of JavaScript objects are shared between pages. This allows for pointer leaks because an object's address can be discovered through hash codes, and also allows for data leakage of an object's content using these hash codes. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5378</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5378.html</URL>
        <Description>CVE-2017-5378</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021818</URL>
        <Description>SUSE Bug 1021818</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A potential use-after-free found through fuzzing during DOM manipulation of SVG content. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5380</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5380.html</URL>
        <Description>CVE-2017-5380</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021819</URL>
        <Description>SUSE Bug 1021819</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">URLs containing certain unicode glyphs for alternative hyphens and quotes do not properly trigger punycode display, allowing for domain name spoofing attacks in the location bar. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5383</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5383.html</URL>
        <Description>CVE-2017-5383</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021822</URL>
        <Description>SUSE Bug 1021822</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">WebExtension scripts can use the "data:" protocol to affect pages loaded by other web extensions using this protocol, leading to potential data disclosure or privilege escalation in affected extensions. This vulnerability affects Firefox ESR &lt; 45.7 and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5386</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5386.html</URL>
        <Description>CVE-2017-5386</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021823</URL>
        <Description>SUSE Bug 1021823</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The JSON viewer in the Developer Tools uses insecure methods to create a communication channel for copying and viewing JSON or HTTP headers data, allowing for potential privilege escalation. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5390</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5390.html</URL>
        <Description>CVE-2017-5390</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021820</URL>
        <Description>SUSE Bug 1021820</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in the Media Decoder when working with media files when some events are fired after the media elements are freed from memory. This vulnerability affects Thunderbird &lt; 45.7, Firefox ESR &lt; 45.7, and Firefox &lt; 51.</Note>
    </Notes>
    <CVE>CVE-2017-5396</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Desktop 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 12-LTSS:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for Raspberry Pi 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP1:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12 SP2:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server for SAP Applications 12:MozillaFirefox-translations-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP1:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
        <ProductID>SUSE Linux Enterprise Software Development Kit 12 SP2:MozillaFirefox-devel-45.7.0esr-99.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.1</BaseScore>
        <Vector>AV:N/AC:H/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
      <ScoreSet>
        <BaseScore>7.5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2017/suse-su-20170427-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2017-5396.html</URL>
        <Description>CVE-2017-5396</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021821</URL>
        <Description>SUSE Bug 1021821</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1021991</URL>
        <Description>SUSE Bug 1021991</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
