Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-11729 (GCVE-0-2019-11729)
Vulnerability from cvelistv5 – Published: 2019-07-23 13:16 – Updated: 2024-08-04 23:03
VLAI?
EPSS
Summary
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
Severity ?
No CVSS data available.
CWE
- Empty or malformed p256-ECDH public keys may trigger a segmentation fault
Assigner
References
Impacted products
| Vendor | Product | Version | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 60.8
(custom)
|
||||||||||||
|
||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:03:32.670Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-21/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-22/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-23/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1515342"
},
{
"name": "openSUSE-SU-2019:1811",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html"
},
{
"name": "openSUSE-SU-2019:1813",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html"
},
{
"name": "RHSA-2019:1951",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1951"
},
{
"name": "GLSA-201908-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201908-12"
},
{
"name": "GLSA-201908-20",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"name": "openSUSE-SU-2019:1990",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
},
{
"name": "openSUSE-SU-2019:2248",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "RHSA-2019:4190",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"name": "[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "68",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.8",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-09-29T21:06:19.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-21/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-22/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-23/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1515342"
},
{
"name": "openSUSE-SU-2019:1811",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html"
},
{
"name": "openSUSE-SU-2019:1813",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html"
},
{
"name": "RHSA-2019:1951",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:1951"
},
{
"name": "GLSA-201908-12",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201908-12"
},
{
"name": "GLSA-201908-20",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"name": "openSUSE-SU-2019:1990",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
},
{
"name": "openSUSE-SU-2019:2248",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "RHSA-2019:4190",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"name": "[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-11729",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.8"
}
]
}
},
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.8"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-21/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-21/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-22/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-22/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-23/",
"refsource": "MISC",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-23/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1515342",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1515342"
},
{
"name": "openSUSE-SU-2019:1811",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html"
},
{
"name": "openSUSE-SU-2019:1813",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html"
},
{
"name": "RHSA-2019:1951",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:1951"
},
{
"name": "GLSA-201908-12",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-12"
},
{
"name": "GLSA-201908-20",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201908-20"
},
{
"name": "openSUSE-SU-2019:1990",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html"
},
{
"name": "openSUSE-SU-2019:2248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "RHSA-2019:4190",
"refsource": "REDHAT",
"url": "https://access.redhat.com/errata/RHSA-2019:4190"
},
{
"name": "[debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update",
"refsource": "MLIST",
"url": "https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2019-11729",
"datePublished": "2019-07-23T13:16:24.000Z",
"dateReserved": "2019-05-03T00:00:00.000Z",
"dateUpdated": "2024-08-04T23:03:32.670Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-11729",
"date": "2026-04-15",
"epss": "0.0055",
"percentile": "0.68003"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"68.0\", \"matchCriteriaId\": \"BB53FE62-B5D2-497B-A7E3-40FFE81A9653\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.8.0\", \"matchCriteriaId\": \"B14D1A72-1C76-4DF2-87AC-466428CB5583\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.8.0\", \"matchCriteriaId\": \"3BD4F2C0-0E41-48C3-8D97-8AA9016D738B\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\"}, {\"lang\": \"es\", \"value\": \"Las claves p\\u00fablicas de p256-ECDH vac\\u00edas o malformadas pueden desencadenar un fallo de segmentaci\\u00f3n debido a que los valores son saneados inapropiadamente antes de copiarlos en la memoria y usarlos. Esta vulnerabilidad afecta a Firefox ESR anterior a versi\\u00f3n 60.8, Firefox anterior a versi\\u00f3n 68 y Thunderbird anterior a versi\\u00f3n 60.8.\"}]",
"id": "CVE-2019-11729",
"lastModified": "2024-11-21T04:21:40.600",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:N/A:P\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2019-07-23T14:15:16.593",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1951\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:4190\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1515342\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201908-12\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://security.gentoo.org/glsa/201908-20\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-21/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-22/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-23/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:1951\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://access.redhat.com/errata/RHSA-2019:4190\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1515342\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201908-12\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://security.gentoo.org/glsa/201908-20\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-21/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-22/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-23/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-11729\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2019-07-23T14:15:16.593\",\"lastModified\":\"2025-11-25T17:50:16.803\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.\"},{\"lang\":\"es\",\"value\":\"Las claves p\u00fablicas de p256-ECDH vac\u00edas o malformadas pueden desencadenar un fallo de segmentaci\u00f3n debido a que los valores son saneados inapropiadamente antes de copiarlos en la memoria y usarlos. Esta vulnerabilidad afecta a Firefox ESR anterior a versi\u00f3n 60.8, Firefox anterior a versi\u00f3n 68 y Thunderbird anterior a versi\u00f3n 60.8.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.8.0\",\"matchCriteriaId\":\"66A15D56-0C99-4E44-9F8D-439D50EC355F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"68.0\",\"matchCriteriaId\":\"BB53FE62-B5D2-497B-A7E3-40FFE81A9653\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.8.0\",\"matchCriteriaId\":\"3BD4F2C0-0E41-48C3-8D97-8AA9016D738B\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1951\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4190\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1515342\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://security.gentoo.org/glsa/201908-12\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://security.gentoo.org/glsa/201908-20\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-21/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-22/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-23/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00055.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-07/msg00058.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00073.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:1951\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2019:4190\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1515342\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2020/09/msg00029.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201908-12\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://security.gentoo.org/glsa/201908-20\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-21/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-22/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-23/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
OPENSUSE-SU-2019:2248-1
Vulnerability from csaf_opensuse - Published: 2019-10-04 10:23 - Updated: 2019-10-04 10:23Summary
Security update for MozillaThunderbird
Severity
Important
Notes
Title of the patch: Security update for MozillaThunderbird
Description of the patch: This update for MozillaThunderbird to version 68.1.1 fixes the following issues:
- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)
- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)
- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)
- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)
- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)
- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)
- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)
- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)
- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)
- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)
- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)
- CVE-2019-11721: Fixed domain spoofing through unicode latin 'kra' character. (bsc#1140868)
- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)
- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)
- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)
- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)
- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)
- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)
- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)
- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)
- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)
- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)
- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)
- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)
- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)
- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)
- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)
This update was imported from the SUSE:SLE-15:Update update project.
Patchnames: openSUSE-2019-2248
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaThunderbird to version 68.1.1 fixes the following issues:\n \n- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)\n- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)\n- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)\n- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)\n- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)\n- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)\n- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)\n- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)\n- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)\n- CVE-2019-11721: Fixed domain spoofing through unicode latin \u0027kra\u0027 character. (bsc#1140868)\n- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)\n- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)\n- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)\n- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)\n- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)\n- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)\n- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)\n- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)\n- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)\n- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)\n- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)\n- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)\n- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)\n- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)\n- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2248",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2248-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2248-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2248-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5"
},
{
"category": "self",
"summary": "SUSE Bug 1140868",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "self",
"summary": "SUSE Bug 1141322",
"url": "https://bugzilla.suse.com/1141322"
},
{
"category": "self",
"summary": "SUSE Bug 1149296",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "self",
"summary": "SUSE Bug 1149297",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "self",
"summary": "SUSE Bug 1149298",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "self",
"summary": "SUSE Bug 1149299",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "self",
"summary": "SUSE Bug 1149303",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "self",
"summary": "SUSE Bug 1149304",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "self",
"summary": "SUSE Bug 1150939",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "self",
"summary": "SUSE Bug 1152375",
"url": "https://bugzilla.suse.com/1152375"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11709 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11711 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11712 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11713 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11715 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11717 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11723 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11724 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11725 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11728 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11729 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11730 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11739 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11744 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11752 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11755/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2019-10-04T10:23:43Z",
"generator": {
"date": "2019-10-04T10:23:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2248-1",
"initial_release_date": "2019-10-04T10:23:43Z",
"revision_history": [
{
"date": "2019-10-04T10:23:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "enigmail-2.1.2-lp150.34.1.x86_64",
"product": {
"name": "enigmail-2.1.2-lp150.34.1.x86_64",
"product_id": "enigmail-2.1.2-lp150.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "enigmail-2.1.2-lp150.34.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
},
"product_reference": "enigmail-2.1.2-lp150.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11709"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11709",
"url": "https://www.suse.com/security/cve/CVE-2019-11709"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11709",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11709"
},
{
"cve": "CVE-2019-11710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11710"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11710",
"url": "https://www.suse.com/security/cve/CVE-2019-11710"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11710",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11710"
},
{
"cve": "CVE-2019-11711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11711"
}
],
"notes": [
{
"category": "general",
"text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11711",
"url": "https://www.suse.com/security/cve/CVE-2019-11711"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11711",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11711"
},
{
"cve": "CVE-2019-11712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11712"
}
],
"notes": [
{
"category": "general",
"text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11712",
"url": "https://www.suse.com/security/cve/CVE-2019-11712"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11712",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11712"
},
{
"cve": "CVE-2019-11713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11713"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11713",
"url": "https://www.suse.com/security/cve/CVE-2019-11713"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11713",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11713"
},
{
"cve": "CVE-2019-11714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11714"
}
],
"notes": [
{
"category": "general",
"text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11714",
"url": "https://www.suse.com/security/cve/CVE-2019-11714"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11714",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11714"
},
{
"cve": "CVE-2019-11715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11715"
}
],
"notes": [
{
"category": "general",
"text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11715",
"url": "https://www.suse.com/security/cve/CVE-2019-11715"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11715",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11715"
},
{
"cve": "CVE-2019-11716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11716"
}
],
"notes": [
{
"category": "general",
"text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11716",
"url": "https://www.suse.com/security/cve/CVE-2019-11716"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11716",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11716"
},
{
"cve": "CVE-2019-11717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11717"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11717",
"url": "https://www.suse.com/security/cve/CVE-2019-11717"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11717",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11717"
},
{
"cve": "CVE-2019-11719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11719"
}
],
"notes": [
{
"category": "general",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11719",
"url": "https://www.suse.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11719",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11720"
}
],
"notes": [
{
"category": "general",
"text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11720",
"url": "https://www.suse.com/security/cve/CVE-2019-11720"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11720",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11720"
},
{
"cve": "CVE-2019-11721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11721"
}
],
"notes": [
{
"category": "general",
"text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11721",
"url": "https://www.suse.com/security/cve/CVE-2019-11721"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11721",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11721"
},
{
"cve": "CVE-2019-11723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11723"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11723",
"url": "https://www.suse.com/security/cve/CVE-2019-11723"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11723",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11723"
},
{
"cve": "CVE-2019-11724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11724"
}
],
"notes": [
{
"category": "general",
"text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11724",
"url": "https://www.suse.com/security/cve/CVE-2019-11724"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11724",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11724"
},
{
"cve": "CVE-2019-11725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11725"
}
],
"notes": [
{
"category": "general",
"text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11725",
"url": "https://www.suse.com/security/cve/CVE-2019-11725"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11725",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11725"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11728"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11728",
"url": "https://www.suse.com/security/cve/CVE-2019-11728"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11728",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11728"
},
{
"cve": "CVE-2019-11729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11729"
}
],
"notes": [
{
"category": "general",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11729",
"url": "https://www.suse.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11729",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11729"
},
{
"cve": "CVE-2019-11730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11730"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11730",
"url": "https://www.suse.com/security/cve/CVE-2019-11730"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11730",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11730"
},
{
"cve": "CVE-2019-11739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11739"
}
],
"notes": [
{
"category": "general",
"text": "Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird \u003c 68.1 and Thunderbird \u003c 60.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11739",
"url": "https://www.suse.com/security/cve/CVE-2019-11739"
},
{
"category": "external",
"summary": "SUSE Bug 1150939 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11739"
},
{
"cve": "CVE-2019-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11740"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11740",
"url": "https://www.suse.com/security/cve/CVE-2019-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1149299 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11740"
},
{
"cve": "CVE-2019-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11742"
}
],
"notes": [
{
"category": "general",
"text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11742",
"url": "https://www.suse.com/security/cve/CVE-2019-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1149303 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11742"
},
{
"cve": "CVE-2019-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11743"
}
],
"notes": [
{
"category": "general",
"text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11743",
"url": "https://www.suse.com/security/cve/CVE-2019-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1149298 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11743"
},
{
"cve": "CVE-2019-11744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11744"
}
],
"notes": [
{
"category": "general",
"text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11744",
"url": "https://www.suse.com/security/cve/CVE-2019-11744"
},
{
"category": "external",
"summary": "SUSE Bug 1149304 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11744"
},
{
"cve": "CVE-2019-11746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11746"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11746",
"url": "https://www.suse.com/security/cve/CVE-2019-11746"
},
{
"category": "external",
"summary": "SUSE Bug 1149297 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11746"
},
{
"cve": "CVE-2019-11752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11752"
}
],
"notes": [
{
"category": "general",
"text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11752",
"url": "https://www.suse.com/security/cve/CVE-2019-11752"
},
{
"category": "external",
"summary": "SUSE Bug 1149296 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11752"
},
{
"cve": "CVE-2019-11755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11755"
}
],
"notes": [
{
"category": "general",
"text": "A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird \u003c 68.1.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11755",
"url": "https://www.suse.com/security/cve/CVE-2019-11755"
},
{
"category": "external",
"summary": "SUSE Bug 1152375 for CVE-2019-11755",
"url": "https://bugzilla.suse.com/1152375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11755"
}
]
}
OPENSUSE-SU-2024:11058-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00Summary
libfreebl3-3.69.1-1.2 on GA media
Severity
Moderate
Notes
Title of the patch: libfreebl3-3.69.1-1.2 on GA media
Description of the patch: These are all security issues fixed in the libfreebl3-3.69.1-1.2 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-11058
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
5.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libfreebl3-3.69.1-1.2 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libfreebl3-3.69.1-1.2 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-11058",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_11058-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-0495 page",
"url": "https://www.suse.com/security/cve/CVE-2018-0495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12384 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12384/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2018-12404 page",
"url": "https://www.suse.com/security/cve/CVE-2018-12404/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11729 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11745 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11745/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-17006 page",
"url": "https://www.suse.com/security/cve/CVE-2019-17006/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12399 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12399/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12401 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12401/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12402 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-12403 page",
"url": "https://www.suse.com/security/cve/CVE-2020-12403/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-25648 page",
"url": "https://www.suse.com/security/cve/CVE-2020-25648/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-6829 page",
"url": "https://www.suse.com/security/cve/CVE-2020-6829/"
}
],
"title": "libfreebl3-3.69.1-1.2 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:11058-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.69.1-1.2.aarch64",
"product": {
"name": "libfreebl3-3.69.1-1.2.aarch64",
"product_id": "libfreebl3-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "libfreebl3-32bit-3.69.1-1.2.aarch64",
"product_id": "libfreebl3-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-3.69.1-1.2.aarch64",
"product": {
"name": "libfreebl3-hmac-3.69.1-1.2.aarch64",
"product_id": "libfreebl3-hmac-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"product_id": "libfreebl3-hmac-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.69.1-1.2.aarch64",
"product": {
"name": "libsoftokn3-3.69.1-1.2.aarch64",
"product_id": "libsoftokn3-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "libsoftokn3-32bit-3.69.1-1.2.aarch64",
"product_id": "libsoftokn3-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-3.69.1-1.2.aarch64",
"product": {
"name": "libsoftokn3-hmac-3.69.1-1.2.aarch64",
"product_id": "libsoftokn3-hmac-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"product_id": "libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-32bit-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-certs-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-certs-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-certs-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-devel-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-devel-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-sysinit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.69.1-1.2.aarch64",
"product": {
"name": "mozilla-nss-tools-3.69.1-1.2.aarch64",
"product_id": "mozilla-nss-tools-3.69.1-1.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.69.1-1.2.ppc64le",
"product": {
"name": "libfreebl3-3.69.1-1.2.ppc64le",
"product_id": "libfreebl3-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "libfreebl3-32bit-3.69.1-1.2.ppc64le",
"product_id": "libfreebl3-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-3.69.1-1.2.ppc64le",
"product": {
"name": "libfreebl3-hmac-3.69.1-1.2.ppc64le",
"product_id": "libfreebl3-hmac-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"product_id": "libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.69.1-1.2.ppc64le",
"product": {
"name": "libsoftokn3-3.69.1-1.2.ppc64le",
"product_id": "libsoftokn3-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"product_id": "libsoftokn3-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"product": {
"name": "libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"product_id": "libsoftokn3-hmac-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"product_id": "libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-certs-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-certs-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-devel-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-devel-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-sysinit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.69.1-1.2.ppc64le",
"product": {
"name": "mozilla-nss-tools-3.69.1-1.2.ppc64le",
"product_id": "mozilla-nss-tools-3.69.1-1.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.69.1-1.2.s390x",
"product": {
"name": "libfreebl3-3.69.1-1.2.s390x",
"product_id": "libfreebl3-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.69.1-1.2.s390x",
"product": {
"name": "libfreebl3-32bit-3.69.1-1.2.s390x",
"product_id": "libfreebl3-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-3.69.1-1.2.s390x",
"product": {
"name": "libfreebl3-hmac-3.69.1-1.2.s390x",
"product_id": "libfreebl3-hmac-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"product": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"product_id": "libfreebl3-hmac-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.69.1-1.2.s390x",
"product": {
"name": "libsoftokn3-3.69.1-1.2.s390x",
"product_id": "libsoftokn3-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.69.1-1.2.s390x",
"product": {
"name": "libsoftokn3-32bit-3.69.1-1.2.s390x",
"product_id": "libsoftokn3-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-3.69.1-1.2.s390x",
"product": {
"name": "libsoftokn3-hmac-3.69.1-1.2.s390x",
"product_id": "libsoftokn3-hmac-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"product": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"product_id": "libsoftokn3-hmac-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-32bit-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-certs-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-certs-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-certs-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-devel-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-devel-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-sysinit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.69.1-1.2.s390x",
"product": {
"name": "mozilla-nss-tools-3.69.1-1.2.s390x",
"product_id": "mozilla-nss-tools-3.69.1-1.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libfreebl3-3.69.1-1.2.x86_64",
"product": {
"name": "libfreebl3-3.69.1-1.2.x86_64",
"product_id": "libfreebl3-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "libfreebl3-32bit-3.69.1-1.2.x86_64",
"product_id": "libfreebl3-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-3.69.1-1.2.x86_64",
"product": {
"name": "libfreebl3-hmac-3.69.1-1.2.x86_64",
"product_id": "libfreebl3-hmac-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"product_id": "libfreebl3-hmac-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-3.69.1-1.2.x86_64",
"product": {
"name": "libsoftokn3-3.69.1-1.2.x86_64",
"product_id": "libsoftokn3-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "libsoftokn3-32bit-3.69.1-1.2.x86_64",
"product_id": "libsoftokn3-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-3.69.1-1.2.x86_64",
"product": {
"name": "libsoftokn3-hmac-3.69.1-1.2.x86_64",
"product_id": "libsoftokn3-hmac-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"product_id": "libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-32bit-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-certs-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-certs-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-certs-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-devel-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-devel-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-devel-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-sysinit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64"
}
},
{
"category": "product_version",
"name": "mozilla-nss-tools-3.69.1-1.2.x86_64",
"product": {
"name": "mozilla-nss-tools-3.69.1-1.2.x86_64",
"product_id": "mozilla-nss-tools-3.69.1-1.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64"
},
"product_reference": "libfreebl3-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le"
},
"product_reference": "libfreebl3-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x"
},
"product_reference": "libfreebl3-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64"
},
"product_reference": "libfreebl3-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "libfreebl3-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "libfreebl3-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x"
},
"product_reference": "libfreebl3-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "libfreebl3-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64"
},
"product_reference": "libfreebl3-hmac-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le"
},
"product_reference": "libfreebl3-hmac-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x"
},
"product_reference": "libfreebl3-hmac-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64"
},
"product_reference": "libfreebl3-hmac-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x"
},
"product_reference": "libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libfreebl3-hmac-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64"
},
"product_reference": "libsoftokn3-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le"
},
"product_reference": "libsoftokn3-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x"
},
"product_reference": "libsoftokn3-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64"
},
"product_reference": "libsoftokn3-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "libsoftokn3-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x"
},
"product_reference": "libsoftokn3-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "libsoftokn3-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64"
},
"product_reference": "libsoftokn3-hmac-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le"
},
"product_reference": "libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x"
},
"product_reference": "libsoftokn3-hmac-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64"
},
"product_reference": "libsoftokn3-hmac-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x"
},
"product_reference": "libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-certs-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-certs-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-certs-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-certs-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-certs-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-devel-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-devel-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-devel-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-devel-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-devel-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-sysinit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.69.1-1.2.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64"
},
"product_reference": "mozilla-nss-tools-3.69.1-1.2.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.69.1-1.2.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le"
},
"product_reference": "mozilla-nss-tools-3.69.1-1.2.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.69.1-1.2.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x"
},
"product_reference": "mozilla-nss-tools-3.69.1-1.2.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mozilla-nss-tools-3.69.1-1.2.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
},
"product_reference": "mozilla-nss-tools-3.69.1-1.2.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-0495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-0495"
}
],
"notes": [
{
"category": "general",
"text": "Libgcrypt before 1.7.10 and 1.8.x before 1.8.3 allows a memory-cache side-channel attack on ECDSA signatures that can be mitigated through the use of blinding during the signing process in the _gcry_ecc_ecdsa_sign function in cipher/ecc-ecdsa.c, aka the Return Of the Hidden Number Problem or ROHNP. To discover an ECDSA key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-0495",
"url": "https://www.suse.com/security/cve/CVE-2018-0495"
},
{
"category": "external",
"summary": "SUSE Bug 1097410 for CVE-2018-0495",
"url": "https://bugzilla.suse.com/1097410"
},
{
"category": "external",
"summary": "SUSE Bug 1121207 for CVE-2018-0495",
"url": "https://bugzilla.suse.com/1121207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-0495"
},
{
"cve": "CVE-2018-12384",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12384"
}
],
"notes": [
{
"category": "general",
"text": "When handling a SSLv2-compatible ClientHello request, the server doesn\u0027t generate a new random value but sends an all-zero value instead. This results in full malleability of the ClientHello for SSLv2 used for TLS 1.2 in all versions prior to NSS 3.39. This does not impact TLS 1.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12384",
"url": "https://www.suse.com/security/cve/CVE-2018-12384"
},
{
"category": "external",
"summary": "SUSE Bug 1106873 for CVE-2018-12384",
"url": "https://bugzilla.suse.com/1106873"
},
{
"category": "external",
"summary": "SUSE Bug 1119105 for CVE-2018-12384",
"url": "https://bugzilla.suse.com/1119105"
},
{
"category": "external",
"summary": "SUSE Bug 1121207 for CVE-2018-12384",
"url": "https://bugzilla.suse.com/1121207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12384"
},
{
"cve": "CVE-2018-12404",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2018-12404"
}
],
"notes": [
{
"category": "general",
"text": "A cached side channel attack during handshakes using RSA encryption could allow for the decryption of encrypted content. This is a variant of the Adaptive Chosen Ciphertext attack (AKA Bleichenbacher attack) and affects all NSS versions prior to NSS 3.41.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2018-12404",
"url": "https://www.suse.com/security/cve/CVE-2018-12404"
},
{
"category": "external",
"summary": "SUSE Bug 1119069 for CVE-2018-12404",
"url": "https://bugzilla.suse.com/1119069"
},
{
"category": "external",
"summary": "SUSE Bug 1119105 for CVE-2018-12404",
"url": "https://bugzilla.suse.com/1119105"
},
{
"category": "external",
"summary": "SUSE Bug 1121207 for CVE-2018-12404",
"url": "https://bugzilla.suse.com/1121207"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2018-12404"
},
{
"cve": "CVE-2019-11719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11719"
}
],
"notes": [
{
"category": "general",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11719",
"url": "https://www.suse.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11719",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11729"
}
],
"notes": [
{
"category": "general",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11729",
"url": "https://www.suse.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11729",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11729"
},
{
"cve": "CVE-2019-11745",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11745"
}
],
"notes": [
{
"category": "general",
"text": "When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 68.3, Firefox ESR \u003c 68.3, and Firefox \u003c 71.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11745",
"url": "https://www.suse.com/security/cve/CVE-2019-11745"
},
{
"category": "external",
"summary": "SUSE Bug 1158328 for CVE-2019-11745",
"url": "https://bugzilla.suse.com/1158328"
},
{
"category": "external",
"summary": "SUSE Bug 1158527 for CVE-2019-11745",
"url": "https://bugzilla.suse.com/1158527"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2019-11745"
},
{
"cve": "CVE-2019-17006",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-17006"
}
],
"notes": [
{
"category": "general",
"text": "In Network Security Services (NSS) before 3.46, several cryptographic primitives had missing length checks. In cases where the application calling the library did not perform a sanity check on the inputs it could result in a crash due to a buffer overflow.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-17006",
"url": "https://www.suse.com/security/cve/CVE-2019-17006"
},
{
"category": "external",
"summary": "SUSE Bug 1159819 for CVE-2019-17006",
"url": "https://bugzilla.suse.com/1159819"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2020-12399",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12399"
}
],
"notes": [
{
"category": "general",
"text": "NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird \u003c 68.9.0, Firefox \u003c 77, and Firefox ESR \u003c 68.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12399",
"url": "https://www.suse.com/security/cve/CVE-2020-12399"
},
{
"category": "external",
"summary": "SUSE Bug 1171978 for CVE-2020-12399",
"url": "https://bugzilla.suse.com/1171978"
},
{
"category": "external",
"summary": "SUSE Bug 1172402 for CVE-2020-12399",
"url": "https://bugzilla.suse.com/1172402"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12399"
},
{
"cve": "CVE-2020-12401",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12401"
}
],
"notes": [
{
"category": "general",
"text": "During ECDSA signature generation, padding applied in the nonce designed to ensure constant-time scalar multiplication was removed, resulting in variable-time execution dependent on secret data. This vulnerability affects Firefox \u003c 80 and Firefox for Android \u003c 80.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12401",
"url": "https://www.suse.com/security/cve/CVE-2020-12401"
},
{
"category": "external",
"summary": "SUSE Bug 1174763 for CVE-2020-12401",
"url": "https://bugzilla.suse.com/1174763"
},
{
"category": "external",
"summary": "SUSE Bug 1175686 for CVE-2020-12401",
"url": "https://bugzilla.suse.com/1175686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12402"
}
],
"notes": [
{
"category": "general",
"text": "During RSA key generation, bignum implementations used a variation of the Binary Extended Euclidean Algorithm which entailed significantly input-dependent flow. This allowed an attacker able to perform electromagnetic-based side channel attacks to record traces leading to the recovery of the secret primes. *Note:* An unmodified Firefox browser does not generate RSA keys in normal operation and is not affected, but products built on top of it might. This vulnerability affects Firefox \u003c 78.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12402",
"url": "https://www.suse.com/security/cve/CVE-2020-12402"
},
{
"category": "external",
"summary": "SUSE Bug 1173032 for CVE-2020-12402",
"url": "https://bugzilla.suse.com/1173032"
},
{
"category": "external",
"summary": "SUSE Bug 1173576 for CVE-2020-12402",
"url": "https://bugzilla.suse.com/1173576"
},
{
"category": "external",
"summary": "SUSE Bug 1174230 for CVE-2020-12402",
"url": "https://bugzilla.suse.com/1174230"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-12403"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way CHACHA20-POLY1305 was implemented in NSS in versions before 3.55. When using multi-part Chacha20, it could cause out-of-bounds reads. This issue was fixed by explicitly disabling multi-part ChaCha20 (which was not functioning correctly) and strictly enforcing tag length. The highest threat from this vulnerability is to confidentiality and system availability.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-12403",
"url": "https://www.suse.com/security/cve/CVE-2020-12403"
},
{
"category": "external",
"summary": "SUSE Bug 1174763 for CVE-2020-12403",
"url": "https://bugzilla.suse.com/1174763"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-25648",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-25648"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the way NSS handled CCS (ChangeCipherSpec) messages in TLS 1.3. This flaw allows a remote attacker to send multiple CCS messages, causing a denial of service for servers compiled with the NSS library. The highest threat from this vulnerability is to system availability. This flaw affects NSS versions before 3.58.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-25648",
"url": "https://www.suse.com/security/cve/CVE-2020-25648"
},
{
"category": "external",
"summary": "SUSE Bug 1177917 for CVE-2020-25648",
"url": "https://bugzilla.suse.com/1177917"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2020-25648"
},
{
"cve": "CVE-2020-6829",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-6829"
}
],
"notes": [
{
"category": "general",
"text": "When performing EC scalar point multiplication, the wNAF point multiplication algorithm was used; which leaked partial information about the nonce used during signature generation. Given an electro-magnetic trace of a few signature generations, the private key could have been computed. This vulnerability affects Firefox \u003c 80 and Firefox for Android \u003c 80.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-6829",
"url": "https://www.suse.com/security/cve/CVE-2020-6829"
},
{
"category": "external",
"summary": "SUSE Bug 1174763 for CVE-2020-6829",
"url": "https://bugzilla.suse.com/1174763"
},
{
"category": "external",
"summary": "SUSE Bug 1175686 for CVE-2020-6829",
"url": "https://bugzilla.suse.com/1175686"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libfreebl3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:libsoftokn3-hmac-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-certs-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-devel-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-sysinit-32bit-3.69.1-1.2.x86_64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.aarch64",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.ppc64le",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.s390x",
"openSUSE Tumbleweed:mozilla-nss-tools-3.69.1-1.2.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2020-6829"
}
]
}
OPENSUSE-SU-2024:14572-1
Vulnerability from csaf_opensuse - Published: 2024-12-12 00:00 - Updated: 2024-12-12 00:00Summary
firefox-esr-128.5.1-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: firefox-esr-128.5.1-1.1 on GA media
Description of the patch: These are all security issues fixed in the firefox-esr-128.5.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2024-14572
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.6 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.2 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.2 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
10 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.6 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.8 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
10 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.6 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.6 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.6 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.1 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.6 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.9 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.5 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
9.8 (Critical)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
6.1 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.2 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.7 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.4 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.1 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.3 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.5 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
5.4 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.3 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
4.2 (Medium)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
8.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
7.8 (High)
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||