{"affected":[{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-48.1","MozillaFirefox-branding-SLED":"45.0-20.38","MozillaFirefox-translations":"45.3.0esr-48.1","firefox-fontconfig":"2.11.0-4.2","libfreebl3":"3.21.1-26.2","libfreebl3-32bit":"3.21.1-26.2","mozilla-nspr":"4.12-25.2","mozilla-nspr-32bit":"4.12-25.2","mozilla-nspr-devel":"4.12-25.2","mozilla-nss":"3.21.1-26.2","mozilla-nss-32bit":"3.21.1-26.2","mozilla-nss-devel":"3.21.1-26.2","mozilla-nss-tools":"3.21.1-26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP2-LTSS","name":"MozillaFirefox","purl":"pkg:rpm/suse/MozillaFirefox&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.3.0esr-48.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-48.1","MozillaFirefox-branding-SLED":"45.0-20.38","MozillaFirefox-translations":"45.3.0esr-48.1","firefox-fontconfig":"2.11.0-4.2","libfreebl3":"3.21.1-26.2","libfreebl3-32bit":"3.21.1-26.2","mozilla-nspr":"4.12-25.2","mozilla-nspr-32bit":"4.12-25.2","mozilla-nspr-devel":"4.12-25.2","mozilla-nss":"3.21.1-26.2","mozilla-nss-32bit":"3.21.1-26.2","mozilla-nss-devel":"3.21.1-26.2","mozilla-nss-tools":"3.21.1-26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP2-LTSS","name":"MozillaFirefox-branding-SLED","purl":"pkg:rpm/suse/MozillaFirefox-branding-SLED&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"45.0-20.38"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-48.1","MozillaFirefox-branding-SLED":"45.0-20.38","MozillaFirefox-translations":"45.3.0esr-48.1","firefox-fontconfig":"2.11.0-4.2","libfreebl3":"3.21.1-26.2","libfreebl3-32bit":"3.21.1-26.2","mozilla-nspr":"4.12-25.2","mozilla-nspr-32bit":"4.12-25.2","mozilla-nspr-devel":"4.12-25.2","mozilla-nss":"3.21.1-26.2","mozilla-nss-32bit":"3.21.1-26.2","mozilla-nss-devel":"3.21.1-26.2","mozilla-nss-tools":"3.21.1-26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP2-LTSS","name":"firefox-fontconfig","purl":"pkg:rpm/suse/firefox-fontconfig&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.0-4.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-48.1","MozillaFirefox-branding-SLED":"45.0-20.38","MozillaFirefox-translations":"45.3.0esr-48.1","firefox-fontconfig":"2.11.0-4.2","libfreebl3":"3.21.1-26.2","libfreebl3-32bit":"3.21.1-26.2","mozilla-nspr":"4.12-25.2","mozilla-nspr-32bit":"4.12-25.2","mozilla-nspr-devel":"4.12-25.2","mozilla-nss":"3.21.1-26.2","mozilla-nss-32bit":"3.21.1-26.2","mozilla-nss-devel":"3.21.1-26.2","mozilla-nss-tools":"3.21.1-26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP2-LTSS","name":"mozilla-nspr","purl":"pkg:rpm/suse/mozilla-nspr&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"4.12-25.2"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"MozillaFirefox":"45.3.0esr-48.1","MozillaFirefox-branding-SLED":"45.0-20.38","MozillaFirefox-translations":"45.3.0esr-48.1","firefox-fontconfig":"2.11.0-4.2","libfreebl3":"3.21.1-26.2","libfreebl3-32bit":"3.21.1-26.2","mozilla-nspr":"4.12-25.2","mozilla-nspr-32bit":"4.12-25.2","mozilla-nspr-devel":"4.12-25.2","mozilla-nss":"3.21.1-26.2","mozilla-nss-32bit":"3.21.1-26.2","mozilla-nss-devel":"3.21.1-26.2","mozilla-nss-tools":"3.21.1-26.2"}]},"package":{"ecosystem":"SUSE:Linux Enterprise Server 11 SP2-LTSS","name":"mozilla-nss","purl":"pkg:rpm/suse/mozilla-nss&distro=SUSE%20Linux%20Enterprise%20Server%2011%20SP2-LTSS"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"3.21.1-26.2"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"MozillaFirefox, MozillaFirefox-branding-SLE, mozilla-nspr and  mozilla-nss were updated to fix nine security issues.\n\nMozillaFirefox was updated to version 45.3.0 ESR. mozilla-nss was updated to version 3.21.1, mozilla-nspr to version 4.12.\n\nThese security issues were fixed in 45.3.0ESR:\n- CVE-2016-2835/CVE-2016-2836: Miscellaneous memory safety hazards (rv:48.0 / rv:45.3) (MFSA 2016-62)\n- CVE-2016-2830: Favicon network connection can persist when page is closed (MFSA 2016-63)\n- CVE-2016-2838: Buffer overflow rendering SVG with bidirectional content (MFSA 2016-64)\n- CVE-2016-2839: Cairo rendering crash due to memory allocation issue with FFmpeg 0.10 (MFSA 2016-65)\n- CVE-2016-5252: Stack underflow during 2D graphics rendering (MFSA 2016-67)\n- CVE-2016-5254: Use-after-free when using alt key and toplevel menus (MFSA 2016-70)\n- CVE-2016-5258: Use-after-free in DTLS during WebRTC session shutdown (MFSA 2016-72)\n- CVE-2016-5259: Use-after-free in service workers with nested sync events (MFSA 2016-73)\n- CVE-2016-5262: Scripts on marquee tag can execute in sandboxed iframes (MFSA 2016-76)\n- CVE-2016-2837: Buffer overflow in ClearKey Content Decryption Module (CDM) during video playback (MFSA 2016-77)\n- CVE-2016-5263: Type confusion in display transformation (MFSA 2016-78)\n- CVE-2016-5264: Use-after-free when applying SVG effects (MFSA 2016-79)\n- CVE-2016-5265: Same-origin policy violation using local HTML file and saved shortcut file (MFSA 2016-80)\n- CVE-2016-6354: Fix for possible buffer overrun (bsc#990856)\n\nSecurity issues fixed in 45.2.0.ESR:\n- CVE-2016-2834: Memory safety bugs in NSS (MFSA 2016-61) (bsc#983639).\n- CVE-2016-2824: Out-of-bounds write with WebGL shader (MFSA 2016-53) (bsc#983651).\n- CVE-2016-2822: Addressbar spoofing though the SELECT element (MFSA 2016-52) (bsc#983652).\n- CVE-2016-2821: Use-after-free deleting tables from a contenteditable document (MFSA 2016-51) (bsc#983653).\n- CVE-2016-2819: Buffer overflow parsing HTML5 fragments (MFSA 2016-50) (bsc#983655).\n- CVE-2016-2828: Use-after-free when textures are used in WebGL operations after recycle pool destruction (MFSA 2016-56) (bsc#983646).\n- CVE-2016-2831: Entering fullscreen and persistent pointerlock without user permission (MFSA 2016-58) (bsc#983643).\n- CVE-2016-2815, CVE-2016-2818: Miscellaneous memory safety hazards (MFSA 2016-49) (bsc#983638)\n\nThese non-security issues were fixed:\n- Fix crashes on aarch64\n  * Determine page size at runtime (bsc#984006)\n  * Allow aarch64 to work in safe mode (bsc#985659)\n- Fix crashes on mainframes\n- Temporarily bind Firefox to the first CPU as a hotfix\n  for an apparent race condition (bsc#989196, bsc#990628)\n\nAll extensions must now be signed by addons.mozilla.org. Please read README.SUSE for more details.\n","id":"SUSE-SU-2016:2061-1","modified":"2016-08-12T16:10:10Z","published":"2016-08-12T16:10:10Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2016/suse-su-20162061-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/983549"},{"type":"REPORT","url":"https://bugzilla.suse.com/983638"},{"type":"REPORT","url":"https://bugzilla.suse.com/983639"},{"type":"REPORT","url":"https://bugzilla.suse.com/983643"},{"type":"REPORT","url":"https://bugzilla.suse.com/983646"},{"type":"REPORT","url":"https://bugzilla.suse.com/983651"},{"type":"REPORT","url":"https://bugzilla.suse.com/983652"},{"type":"REPORT","url":"https://bugzilla.suse.com/983653"},{"type":"REPORT","url":"https://bugzilla.suse.com/983655"},{"type":"REPORT","url":"https://bugzilla.suse.com/984006"},{"type":"REPORT","url":"https://bugzilla.suse.com/985659"},{"type":"REPORT","url":"https://bugzilla.suse.com/989196"},{"type":"REPORT","url":"https://bugzilla.suse.com/990628"},{"type":"REPORT","url":"https://bugzilla.suse.com/990856"},{"type":"REPORT","url":"https://bugzilla.suse.com/991809"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2815"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2818"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2819"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2821"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2822"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2824"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2828"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2830"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2831"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2834"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2835"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2836"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2837"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2838"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-2839"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5252"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5254"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5258"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5259"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5262"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5263"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5264"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-5265"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2016-6354"}],"related":["CVE-2016-2815","CVE-2016-2818","CVE-2016-2819","CVE-2016-2821","CVE-2016-2822","CVE-2016-2824","CVE-2016-2828","CVE-2016-2830","CVE-2016-2831","CVE-2016-2834","CVE-2016-2835","CVE-2016-2836","CVE-2016-2837","CVE-2016-2838","CVE-2016-2839","CVE-2016-5252","CVE-2016-5254","CVE-2016-5258","CVE-2016-5259","CVE-2016-5262","CVE-2016-5263","CVE-2016-5264","CVE-2016-5265","CVE-2016-6354"],"summary":"Security update for MozillaFirefox, MozillaFirefox-branding-SLED, mozilla-nspr and mozilla-nss","upstream":["CVE-2016-2815","CVE-2016-2818","CVE-2016-2819","CVE-2016-2821","CVE-2016-2822","CVE-2016-2824","CVE-2016-2828","CVE-2016-2830","CVE-2016-2831","CVE-2016-2834","CVE-2016-2835","CVE-2016-2836","CVE-2016-2837","CVE-2016-2838","CVE-2016-2839","CVE-2016-5252","CVE-2016-5254","CVE-2016-5258","CVE-2016-5259","CVE-2016-5262","CVE-2016-5263","CVE-2016-5264","CVE-2016-5265","CVE-2016-6354"]}