{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-78.1","MozillaFirefox-translations":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Desktop 12 SP1","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Desktop%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-78.1","MozillaFirefox-translations":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox-devel":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Software Development Kit 12 SP1","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Software%20Development%20Kit%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-78.1","MozillaFirefox-translations":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-78.1","MozillaFirefox-translations":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 12 SP1","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-78.1","MozillaFirefox-translations":"45.3.0esr-78.1"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server for SAP Applications 12 SP1","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20Applications%2012%20SP1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-78.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"\nMozillaFirefox was updated to 45.3.0 ESR to fix the following issues\n(bsc#991809):\n\n* MFSA 2016-62/CVE-2016-2835/CVE-2016-2836\n  Miscellaneous memory safety hazards (rv:48.0 / rv:45.3)\n* MFSA 2016-63/CVE-2016-2830\n  Favicon network connection can persist when page is closed\n* MFSA 2016-64/CVE-2016-2838\n  Buffer overflow rendering SVG with bidirectional content\n* MFSA 2016-65/CVE-2016-2839\n  Cairo rendering crash due to memory allocation issue with\n  FFmpeg 0.10\n* MFSA 2016-67/CVE-2016-5252\n  Stack underflow during 2D graphics rendering\n* MFSA 2016-70/CVE-2016-5254\n  Use-after-free when using alt key and toplevel menus\n* MFSA 2016-72/CVE-2016-5258\n  Use-after-free in DTLS during WebRTC session shutdown\n* MFSA 2016-73/CVE-2016-5259\n  Use-after-free in service workers with nested sync events\n* MFSA 2016-76/CVE-2016-5262\n  Scripts on marquee tag can execute in sandboxed iframes\n* MFSA 2016-77/CVE-2016-2837\n  Buffer overflow in ClearKey Content Decryption Module (CDM)\n  during video playback\n* MFSA 2016-78/CVE-2016-5263\n  Type confusion in display transformation\n* MFSA 2016-79/CVE-2016-5264\n  Use-after-free when applying SVG effects\n* MFSA 2016-80/CVE-2016-5265\n  Same-origin policy violation using local HTML file and saved\n  shortcut file\n* CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)\n\nAlso a temporary workaround was added:\n- Temporarily bind Firefox to the first CPU as a hotfix\n  for an apparent race condition (bsc#989196, bsc#990628)\n","id":"SUSE-SU-2016:2131-1","modified":"2016-08-22T14:37:43Z","published":"2016-08-22T14:37:43Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162131-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/989196"},{"type":"REPORT","url":"https://bugzilla.suse.com/990628"},{"type":"REPORT","url":"https://bugzilla.suse.com/990856"},{"type":"REPORT","url":"https://bugzilla.suse.com/991809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6354"}],"related":["CVE-2016-2830","CVE-2016-2835","CVE-2016-2836","CVE-2016-2837","CVE-2016-2838","CVE-2016-2839","CVE-2016-5252","CVE-2016-5254","CVE-2016-5258","CVE-2016-5259","CVE-2016-5262","CVE-2016-5263","CVE-2016-5264","CVE-2016-5265","CVE-2016-6354"],"summary":"Security update for MozillaFirefox","upstream":["CVE-2016-2830","CVE-2016-2835","CVE-2016-2836","CVE-2016-2837","CVE-2016-2838","CVE-2016-2839","CVE-2016-5252","CVE-2016-5254","CVE-2016-5258","CVE-2016-5259","CVE-2016-5262","CVE-2016-5263","CVE-2016-5264","CVE-2016-5265","CVE-2016-6354"]}