<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for MozillaFirefox, rust-cbindgen</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2021:14826-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2021-10-18T08:43:46Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2021-10-18T08:43:46Z</InitialReleaseDate>
    <CurrentReleaseDate>2021-10-18T08:43:46Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for MozillaFirefox, rust-cbindgen</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for MozillaFirefox, rust-cbindgen fixes the following issues:

MozillaFirefox was updated to Extended Support Release 91.2.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-45 (bsc#1191332)

  * CVE-2021-38496: Use-after-free in MessageTask
  * CVE-2021-38497: Validation message could have been overlaid on another origin
  * CVE-2021-38498: Use-after-free of nsLanguageAtomService object
  * CVE-2021-32810: Data race in crossbeam-deque
  * CVE-2021-38500: Memory safety bugs fixed in Firefox 93, Firefox ESR 78.15, and Firefox ESR 91.2
  * CVE-2021-38501: Memory safety bugs fixed in Firefox 93 and Firefox ESR 91.2

- Fixed crash in FIPS mode (bsc#1190710)

Firefox Extended Support Release 91.1.0 ESR

* Fixed: Various stability, functionality, and security fixes

MFSA 2021-40 (bsc#1190269, bsc#1190274)

* CVE-2021-38492: Navigating to `mk:` URL scheme could load Internet Explorer
* CVE-2021-38495: Memory safety bugs fixed in Firefox 92 and Firefox ESR 91.1

Firefox 91.0.1esr ESR

  * Fixed: Fixed an issue causing buttons on the tab bar to be
    resized when loading certain websites (bug 1704404)
    (bmo#1704404)
  * Fixed: Fixed an issue which caused tabs from private windows
    to be visible in non-private windows when viewing switch-to-
    tab results in the address bar panel (bug 1720369)
    (bmo#1720369)
  * Fixed: Various stability fixes
  * Fixed: Security fix
  MFSA 2021-37 (bsc#1189547)
  * CVE-2021-29991 (bmo#1724896)
    Header Splitting possible with HTTP/3 Responses

Firefox Extended Support Release 91.0 ESR

  * New: Some of the highlights of the new Extended Support
    Release are:
    - A number of user interface changes. For more information,
    see the Firefox 89 release notes.
    - Firefox now supports logging into Microsoft, work, and
    school accounts using Windows single sign-on. Learn more
    - On Windows, updates can now be applied in the background
    while Firefox is not running.
    - Firefox for Windows now offers a new page about:third-party
    to help identify compatibility issues caused by third-party
    applications
    - Version 2 of Firefox's SmartBlock feature further improves
    private browsing. Third party Facebook scripts are blocked to
    prevent you from being tracked, but are now automatically
    loaded 'just in time' if you decide to 'Log in with Facebook'
    on any website.
    - Enhanced the privacy of the Firefox Browser's Private
    Browsing mode with Total Cookie Protection, which confines
    cookies to the site where they were created, preventing
    companis from using cookies to track your browsing across
    sites. This feature was originally launched in Firefox's ETP
    Strict mode.
    - PDF forms now support JavaScript embedded in PDF files.
    Some PDF forms use JavaScript for validation and other
    interactive features.
    - You'll encounter less website breakage in Private Browsing
    and Strict Enhanced Tracking Protection with SmartBlock,
    which provides stand-in scripts so that websites load
    properly.
    - Improved Print functionality with a cleaner design and
    better integration with your computer's printer settings.
    - Firefox now protects you from supercookies, a type of
    tracker that can stay hidden in your browser and track you
    online, even after you clear cookies. By isolating
    supercookies, Firefox prevents them from tracking your web
    browsing from one site to the next.
    - Firefox now remembers your preferred location for saved
    bookmarks, displays the bookmarks toolbar by default on new
    tabs, and gives you easy access to all of your bookmarks via
    a toolbar folder.
    - Native support for macOS devices built with Apple Silicon
    CPUs brings dramatic performance improvements over the non-
    native build that was shipped in Firefox 83: Firefox launches
    over 2.5 times faster and web apps are now twice as
    responsive (per the SpeedoMeter 2.0 test). If you are on a
    new Apple device, follow these steps to upgrade to the latest
    Firefox.
    - Pinch zooming will now be supported for our users with
    Windows touchscreen devices and touchpads on Mac devices.
    Firefox users may now use pinch to zoom on touch-capable
    devices to zoom in and out of webpages.
    - We’ve improved functionality and design for a number of
    Firefox search features:
      * Selecting a search engine at the bottom of the search
    panel now enters search mode for that engine, allowing you to
    see suggestions (if available) for your search terms. The old
    behavior (immediately performing a search) is available with
    a shift-click.
      * When Firefox autocompletes the URL of one of your search
    engines, you can now search with that engine directly in the
    address bar by selecting the shortcut in the address bar
    results.
      * We’ve added buttons at the bottom of the search panel to
    allow you to search your bookmarks, open tabs, and history.
    - Firefox supports AcroForm, which will allow you to fill in,
    print, and save supported PDF forms and the PDF viewer also
    has a new fresh look.
    - For our users in the US and Canada, Firefox can now save,
    manage, and auto-fill credit card information for you, making
    shopping on Firefox ever more convenient.
    - In addition to our default, dark and light themes, with
    this release, Firefox introduces the Alpenglow theme: a
    colorful appearance for buttons, menus, and windows. You can
    update your Firefox themes under settings or preferences.
  * Changed: Firefox no longer supports Adobe Flash. There is no
    setting available to re-enable Flash support.
  * Enterprise: Various bug fixes and new policies have been
    implemented in the latest version of Firefox. See more
    details in the Firefox for Enterprise 91 Release Notes.

MFSA 2021-33 (bsc#1188891)

* CVE-2021-29986: Race condition when resolving DNS names could have led to memory corruption
* CVE-2021-29981: Live range splitting could have led to conflicting assignments in the JIT
* CVE-2021-29988: Memory corruption as a result of incorrect style treatment
* CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode
* CVE-2021-29984: Incorrect instruction reordering during JIT optimization
* CVE-2021-29980: Uninitialized memory in a canvas object could have led to memory corruption
* CVE-2021-29987: Users could have been tricked into accepting unwanted permissions on Linux
* CVE-2021-29985: Use-after-free media channels
* CVE-2021-29982: Single bit data leak due to incorrect JIT optimization and type confusion
* CVE-2021-29989: Memory safety bugs fixed in Firefox 91 and Firefox ESR 78.13
* CVE-2021-29990: Memory safety bugs fixed in Firefox 91

rust-cbindgen was updated to 0.19.0.
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">slessp4-MozillaFirefox-91esr-14826</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      <Description>Link for SUSE-SU-2021:14826-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2021-October/009604.html</URL>
      <Description>E-Mail link for SUSE-SU-2021:14826-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1188891</URL>
      <Description>SUSE Bug 1188891</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1189547</URL>
      <Description>SUSE Bug 1189547</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190269</URL>
      <Description>SUSE Bug 1190269</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190274</URL>
      <Description>SUSE Bug 1190274</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1190710</URL>
      <Description>SUSE Bug 1190710</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1191332</URL>
      <Description>SUSE Bug 1191332</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29980/</URL>
      <Description>SUSE CVE CVE-2021-29980 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29981/</URL>
      <Description>SUSE CVE CVE-2021-29981 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29982/</URL>
      <Description>SUSE CVE CVE-2021-29982 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29983/</URL>
      <Description>SUSE CVE CVE-2021-29983 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29984/</URL>
      <Description>SUSE CVE CVE-2021-29984 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29985/</URL>
      <Description>SUSE CVE CVE-2021-29985 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29986/</URL>
      <Description>SUSE CVE CVE-2021-29986 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29987/</URL>
      <Description>SUSE CVE CVE-2021-29987 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29988/</URL>
      <Description>SUSE CVE CVE-2021-29988 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29989/</URL>
      <Description>SUSE CVE CVE-2021-29989 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29990/</URL>
      <Description>SUSE CVE CVE-2021-29990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-29991/</URL>
      <Description>SUSE CVE CVE-2021-29991 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-32810/</URL>
      <Description>SUSE CVE CVE-2021-32810 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38492/</URL>
      <Description>SUSE CVE CVE-2021-38492 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38495/</URL>
      <Description>SUSE CVE CVE-2021-38495 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38496/</URL>
      <Description>SUSE CVE CVE-2021-38496 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38497/</URL>
      <Description>SUSE CVE CVE-2021-38497 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38498/</URL>
      <Description>SUSE CVE CVE-2021-38498 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38500/</URL>
      <Description>SUSE CVE CVE-2021-38500 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2021-38501/</URL>
      <Description>SUSE CVE CVE-2021-38501 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 11 SP4-LTSS">
        <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS" CPE="cpe:/o:suse:suse_sles:11:sp4">SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-91.2.0-78.143.1">
      <FullProductName ProductID="MozillaFirefox-91.2.0-78.143.1">MozillaFirefox-91.2.0-78.143.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-branding-SLED-91-21.18.1">
      <FullProductName ProductID="MozillaFirefox-branding-SLED-91-21.18.1">MozillaFirefox-branding-SLED-91-21.18.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-common-91.2.0-78.143.1">
      <FullProductName ProductID="MozillaFirefox-translations-common-91.2.0-78.143.1">MozillaFirefox-translations-common-91.2.0-78.143.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="MozillaFirefox-translations-other-91.2.0-78.143.1">
      <FullProductName ProductID="MozillaFirefox-translations-other-91.2.0-78.143.1">MozillaFirefox-translations-other-91.2.0-78.143.1</FullProductName>
    </Branch>
    <Relationship ProductReference="MozillaFirefox-91.2.0-78.143.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1">MozillaFirefox-91.2.0-78.143.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-branding-SLED-91-21.18.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1">MozillaFirefox-branding-SLED-91-21.18.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-common-91.2.0-78.143.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1">MozillaFirefox-translations-common-91.2.0-78.143.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
    <Relationship ProductReference="MozillaFirefox-translations-other-91.2.0-78.143.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 11 SP4-LTSS">
      <FullProductName ProductID="SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1">MozillaFirefox-translations-other-91.2.0-78.143.1 as a component of SUSE Linux Enterprise Server 11 SP4-LTSS</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29980</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29980.html</URL>
        <Description>CVE-2021-29980</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29981</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29981.html</URL>
        <Description>CVE-2021-29981</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189631</URL>
        <Description>SUSE Bug 1189631</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29982</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29982.html</URL>
        <Description>CVE-2021-29982</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189630</URL>
        <Description>SUSE Bug 1189630</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox for Android could get stuck in fullscreen mode and not exit it even after normal interactions that should cause it to exit. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29983</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29983.html</URL>
        <Description>CVE-2021-29983</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29984</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29984.html</URL>
        <Description>CVE-2021-29984</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29985</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29985.html</URL>
        <Description>CVE-2021-29985</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29986</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29986.html</URL>
        <Description>CVE-2021-29986</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">After requesting multiple permissions, and closing the first permission panel, subsequent permission panels will be displayed in a different position but still record a click in the default location, making it possible to trick a user into accepting a permission they did not want to. *This bug only affects Firefox on Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 91 and Thunderbird &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29987</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:N/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29987.html</URL>
        <Description>CVE-2021-29987</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189629</URL>
        <Description>SUSE Bug 1189629</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.13, Thunderbird &lt; 91, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29988</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29988.html</URL>
        <Description>CVE-2021-29988</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.13, Firefox ESR &lt; 78.13, and Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29989</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29989.html</URL>
        <Description>CVE-2021-29989</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1188891</URL>
        <Description>SUSE Bug 1188891</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 91.</Note>
    </Notes>
    <CVE>CVE-2021-29990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29990.html</URL>
        <Description>CVE-2021-29990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189628</URL>
        <Description>SUSE Bug 1189628</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="12">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox &lt; 91.0.1 and Thunderbird &lt; 91.0.1.</Note>
    </Notes>
    <CVE>CVE-2021-29991</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-29991.html</URL>
        <Description>CVE-2021-29991</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1189547</URL>
        <Description>SUSE Bug 1189547</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="13">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.</Note>
    </Notes>
    <CVE>CVE-2021-32810</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-32810.html</URL>
        <Description>CVE-2021-32810</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="14">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox &lt; 92, Thunderbird &lt; 91.1, Thunderbird &lt; 78.14, Firefox ESR &lt; 78.14, and Firefox ESR &lt; 91.1.</Note>
    </Notes>
    <CVE>CVE-2021-38492</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38492.html</URL>
        <Description>CVE-2021-38492</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190269</URL>
        <Description>SUSE Bug 1190269</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="15">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 91.1 and Firefox ESR &lt; 91.1.</Note>
    </Notes>
    <CVE>CVE-2021-38495</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38495.html</URL>
        <Description>CVE-2021-38495</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1190269</URL>
        <Description>SUSE Bug 1190269</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="16">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.</Note>
    </Notes>
    <CVE>CVE-2021-38496</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38496.html</URL>
        <Description>CVE-2021-38496</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="17">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.</Note>
    </Notes>
    <CVE>CVE-2021-38497</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>4.3</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:N/I:P/A:N</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38497.html</URL>
        <Description>CVE-2021-38497</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="18">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.</Note>
    </Notes>
    <CVE>CVE-2021-38498</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>5</BaseScore>
        <Vector>AV:N/AC:L/Au:N/C:N/I:N/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38498.html</URL>
        <Description>CVE-2021-38498</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="19">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird &lt; 78.15, Thunderbird &lt; 91.2, Firefox ESR &lt; 91.2, Firefox ESR &lt; 78.15, and Firefox &lt; 93.</Note>
    </Notes>
    <CVE>CVE-2021-38500</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38500.html</URL>
        <Description>CVE-2021-38500</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="20">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox &lt; 93, Thunderbird &lt; 91.2, and Firefox ESR &lt; 91.2.</Note>
    </Notes>
    <CVE>CVE-2021-38501</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-branding-SLED-91-21.18.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-common-91.2.0-78.143.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 11 SP4-LTSS:MozillaFirefox-translations-other-91.2.0-78.143.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <CVSSScoreSets>
      <ScoreSet>
        <BaseScore>6.8</BaseScore>
        <Vector>AV:N/AC:M/Au:N/C:P/I:P/A:P</Vector>
      </ScoreSet>
    </CVSSScoreSets>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2021/suse-su-202114826-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2021-38501.html</URL>
        <Description>CVE-2021-38501</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1191332</URL>
        <Description>SUSE Bug 1191332</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
