<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2015:1492-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2015-08-31T15:18:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2015-08-31T15:18:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2015-08-31T15:18:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">MozillaFirefox was updated to version 40.0.3 to fix two security issues and several bugs.

Changes in MozillaFirefox:
- update to Firefox 40.0.3 (bnc#943550)
  * Disable the asynchronous plugin initialization (bmo#1198590)
  * Fix a segmentation fault in the GStreamer support (bmo#1145230)
  * Fix a regression with some Japanese fonts used in the &lt;input&gt;
    field (bmo#1194055)
  * On some sites, the selection in a select combox box using the
    mouse could be broken (bmo#1194733)
  security fixes
  * MFSA 2015-94/CVE-2015-4497 (bmo#1164766, bmo#1175278, bsc#943557)
    Use-after-free when resizing canvas element during restyling
  * MFSA 2015-95/CVE-2015-4498 (bmo#1042699, bsc#943558)
    Add-on notification bypass through data URLs
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html</URL>
      <Description>E-Mail link for openSUSE-SU-2015:1492-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Version" Name="MozillaFirefox-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-40.0.3-85.2">MozillaFirefox-40.0.3-85.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-upstream-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-branding-upstream-40.0.3-85.2">MozillaFirefox-branding-upstream-40.0.3-85.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-buildsymbols-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-buildsymbols-40.0.3-85.2">MozillaFirefox-buildsymbols-40.0.3-85.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-devel-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-devel-40.0.3-85.2">MozillaFirefox-devel-40.0.3-85.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-translations-common-40.0.3-85.2">MozillaFirefox-translations-common-40.0.3-85.2</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-40.0.3-85.2">
      <FullProductName ProductID="MozillaFirefox-translations-other-40.0.3-85.2">MozillaFirefox-translations-other-40.0.3-85.2</FullProductName>
    </Branch>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.</Note>
    </Notes>
    <CVE>CVE-2015-4497</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4497.html</URL>
        <Description>CVE-2015-4497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943550</URL>
        <Description>SUSE Bug 943550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943557</URL>
        <Description>SUSE Bug 943557</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943608</URL>
        <Description>SUSE Bug 943608</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">The add-on installation feature in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to bypass an intended user-confirmation requirement by constructing a crafted data: URL and triggering navigation to an arbitrary http: or https: URL at a certain early point in the installation process.</Note>
    </Notes>
    <CVE>CVE-2015-4498</CVE>
    <ProductStatuses>
      <Status Type="Fixed"/>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">Please Install the update.</Description>
        <URL>https://lists.opensuse.org/opensuse-updates/2015-09/msg00000.html</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2015-4498.html</URL>
        <Description>CVE-2015-4498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943550</URL>
        <Description>SUSE Bug 943550</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943558</URL>
        <Description>SUSE Bug 943558</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/943608</URL>
        <Description>SUSE Bug 943608</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
