Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2019-11742 (GCVE-0-2019-11742)
Vulnerability from cvelistv5 – Published: 2019-09-27 17:18 – Updated: 2024-08-04 23:03- Same-origin policy violation with SVG filters and canvas to steal cross-origin images
| URL | Tags |
|---|---|
| https://bugzilla.mozilla.org/show_bug.cgi?id=1559715 | x_refsource_MISC |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_CONFIRM |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_CONFIRM |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_CONFIRM |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_CONFIRM |
| https://www.mozilla.org/security/advisories/mfsa2… | x_refsource_CONFIRM |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| http://lists.opensuse.org/opensuse-security-annou… | vendor-advisoryx_refsource_SUSE |
| https://usn.ubuntu.com/4150-1/ | vendor-advisoryx_refsource_UBUNTU |
| https://security.gentoo.org/glsa/201911-07 | vendor-advisoryx_refsource_GENTOO |
| Vendor | Product | Version | |
|---|---|---|---|
| Mozilla | Firefox |
Affected:
unspecified , < 69
(custom)
|
|
| Mozilla | Thunderbird |
Affected:
unspecified , < 68.1
(custom)
Affected: unspecified , < 60.9 (custom) |
|
| Mozilla | Firefox ESR |
Affected:
unspecified , < 60.9
(custom)
Affected: unspecified , < 68.1 (custom) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T23:03:32.489Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"name": "openSUSE-SU-2019:2248",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "openSUSE-SU-2019:2251",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"name": "openSUSE-SU-2019:2260",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"name": "USN-4150-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"name": "GLSA-201911-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "https://security.gentoo.org/glsa/201911-07"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Firefox",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "69",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Thunderbird",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "68.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "60.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
},
{
"product": "Firefox ESR",
"vendor": "Mozilla",
"versions": [
{
"lessThan": "60.9",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
},
{
"lessThan": "68.1",
"status": "affected",
"version": "unspecified",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Same-origin policy violation with SVG filters and canvas to steal cross-origin images",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-11-25T01:07:09.000Z",
"orgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"shortName": "mozilla"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"name": "openSUSE-SU-2019:2248",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "openSUSE-SU-2019:2251",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"name": "openSUSE-SU-2019:2260",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"name": "USN-4150-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"name": "GLSA-201911-07",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "https://security.gentoo.org/glsa/201911-07"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-11742",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "69"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.1"
},
{
"version_affected": "\u003c",
"version_value": "60.9"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.9"
},
{
"version_affected": "\u003c",
"version_value": "68.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Same-origin policy violation with SVG filters and canvas to steal cross-origin images"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-25/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-27/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-26/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-29/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-30/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"name": "openSUSE-SU-2019:2248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "openSUSE-SU-2019:2251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"name": "openSUSE-SU-2019:2260",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"name": "USN-4150-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"name": "GLSA-201911-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201911-07"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "f16b083a-5664-49f3-a51e-8d479e5ed7fe",
"assignerShortName": "mozilla",
"cveId": "CVE-2019-11742",
"datePublished": "2019-09-27T17:18:22.000Z",
"dateReserved": "2019-05-03T00:00:00.000Z",
"dateUpdated": "2024-08-04T23:03:32.489Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2019-11742",
"date": "2026-05-19",
"epss": "0.0053",
"percentile": "0.67419"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"69.0\", \"matchCriteriaId\": \"299AA921-46BD-4E9F-8D74-F304F44C6EB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.9.0\", \"matchCriteriaId\": \"374FD799-289B-4AD5-867D-5249DDD4C88E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"68.0\", \"versionEndExcluding\": \"68.1.0\", \"matchCriteriaId\": \"FE2AF870-C78F-49CA-B92B-F2E82F1C0B98\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"60.9.0\", \"matchCriteriaId\": \"6767554B-7534-4C6A-8E34-F389CD3B8934\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"68.0\", \"versionEndExcluding\": \"68.1.0\", \"matchCriteriaId\": \"1BA30451-E9AB-4FAE-AA49-91FCCFBE3377\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una violaci\\u00f3n de la pol\\u00edtica del mismo origen, que permite el robo de im\\u00e1genes de origen cruzado por medio de una combinaci\\u00f3n de filtros SVG y un elemento \u0026lt;canvas\u0026gt; debido a un error en c\\u00f3mo es aplicada la pol\\u00edtica del mismo origen para el contenido de imagen en la memoria cach\\u00e9. La violaci\\u00f3n de la pol\\u00edtica del mismo origen resultante podr\\u00eda permitir el robo de datos. Esta vulnerabilidad afecta a Firefox versiones anteriores a 69, Thunderbird versiones anteriores a 68.1, Thunderbird versiones anteriores a 60.9, Firefox versiones anteriores a 60.9 y Firefox ESR versiones anteriores a 68.1.\"}]",
"id": "CVE-2019-11742",
"lastModified": "2024-11-21T04:21:41.967",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2019-09-27T18:15:11.943",
"references": "[{\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1559715\", \"source\": \"security@mozilla.org\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201911-07\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://usn.ubuntu.com/4150-1/\", \"source\": \"security@mozilla.org\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-25/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-26/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-27/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-29/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-30/\", \"source\": \"security@mozilla.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.mozilla.org/show_bug.cgi?id=1559715\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Permissions Required\", \"Vendor Advisory\"]}, {\"url\": \"https://security.gentoo.org/glsa/201911-07\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://usn.ubuntu.com/4150-1/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-25/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-26/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-27/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-29/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.mozilla.org/security/advisories/mfsa2019-30/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-829\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2019-11742\",\"sourceIdentifier\":\"security@mozilla.org\",\"published\":\"2019-09-27T18:15:11.943\",\"lastModified\":\"2025-11-25T17:50:16.803\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.\"},{\"lang\":\"es\",\"value\":\"Se presenta una violaci\u00f3n de la pol\u00edtica del mismo origen, que permite el robo de im\u00e1genes de origen cruzado por medio de una combinaci\u00f3n de filtros SVG y un elemento \u0026lt;canvas\u0026gt; debido a un error en c\u00f3mo es aplicada la pol\u00edtica del mismo origen para el contenido de imagen en la memoria cach\u00e9. La violaci\u00f3n de la pol\u00edtica del mismo origen resultante podr\u00eda permitir el robo de datos. Esta vulnerabilidad afecta a Firefox versiones anteriores a 69, Thunderbird versiones anteriores a 68.1, Thunderbird versiones anteriores a 60.9, Firefox versiones anteriores a 60.9 y Firefox ESR versiones anteriores a 68.1.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-829\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.9.0\",\"matchCriteriaId\":\"D231E5FC-4EBD-425A-95A9-634A155E2A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"69.0\",\"matchCriteriaId\":\"299AA921-46BD-4E9F-8D74-F304F44C6EB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"68.0\",\"versionEndExcluding\":\"68.1.0\",\"matchCriteriaId\":\"FE2AF870-C78F-49CA-B92B-F2E82F1C0B98\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"60.9.0\",\"matchCriteriaId\":\"6767554B-7534-4C6A-8E34-F389CD3B8934\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"68.0\",\"versionEndExcluding\":\"68.1.0\",\"matchCriteriaId\":\"1BA30451-E9AB-4FAE-AA49-91FCCFBE3377\"}]}]}],\"references\":[{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1559715\",\"source\":\"security@mozilla.org\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201911-07\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://usn.ubuntu.com/4150-1/\",\"source\":\"security@mozilla.org\"},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-25/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-26/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-27/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-29/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-30/\",\"source\":\"security@mozilla.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.mozilla.org/show_bug.cgi?id=1559715\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Permissions Required\",\"Vendor Advisory\"]},{\"url\":\"https://security.gentoo.org/glsa/201911-07\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://usn.ubuntu.com/4150-1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-25/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-26/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-27/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-29/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.mozilla.org/security/advisories/mfsa2019-30/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
CERTFR-2019-AVI-421
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 Firefox ESR 60.9",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 Firefox 69",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 Firefox ESR 68.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11736",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11736"
},
{
"name": "CVE-2019-11752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11752"
},
{
"name": "CVE-2019-9812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9812"
},
{
"name": "CVE-2019-11748",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11748"
},
{
"name": "CVE-2019-11751",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11751"
},
{
"name": "CVE-2019-11743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11743"
},
{
"name": "CVE-2019-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5849"
},
{
"name": "CVE-2019-11735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11735"
},
{
"name": "CVE-2019-11742",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11742"
},
{
"name": "CVE-2019-11749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11749"
},
{
"name": "CVE-2019-11747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11747"
},
{
"name": "CVE-2019-11750",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11750"
},
{
"name": "CVE-2019-11734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11734"
},
{
"name": "CVE-2019-11737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11737"
},
{
"name": "CVE-2019-11738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11738"
},
{
"name": "CVE-2019-11753",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11753"
},
{
"name": "CVE-2019-11744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11744"
},
{
"name": "CVE-2019-11740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11740"
},
{
"name": "CVE-2019-11746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11746"
},
{
"name": "CVE-2019-11741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11741"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-421",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa 2019-27 du 03 septembre 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa 2019-25 du 03 septembre 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/"
}
]
}
CERTFR-2019-AVI-421
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Mozilla Firefox. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une exécution de code arbitraire et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 Firefox ESR 60.9",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox versions ant\u00e9rieures \u00e0 Firefox 69",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
},
{
"description": "Firefox ESR versions ant\u00e9rieures \u00e0 Firefox ESR 68.1",
"product": {
"name": "Firefox",
"vendor": {
"name": "Mozilla",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2019-11736",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11736"
},
{
"name": "CVE-2019-11752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11752"
},
{
"name": "CVE-2019-9812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9812"
},
{
"name": "CVE-2019-11748",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11748"
},
{
"name": "CVE-2019-11751",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11751"
},
{
"name": "CVE-2019-11743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11743"
},
{
"name": "CVE-2019-5849",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5849"
},
{
"name": "CVE-2019-11735",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11735"
},
{
"name": "CVE-2019-11742",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11742"
},
{
"name": "CVE-2019-11749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11749"
},
{
"name": "CVE-2019-11747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11747"
},
{
"name": "CVE-2019-11750",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11750"
},
{
"name": "CVE-2019-11734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11734"
},
{
"name": "CVE-2019-11737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11737"
},
{
"name": "CVE-2019-11738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11738"
},
{
"name": "CVE-2019-11753",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11753"
},
{
"name": "CVE-2019-11744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11744"
},
{
"name": "CVE-2019-11740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11740"
},
{
"name": "CVE-2019-11746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11746"
},
{
"name": "CVE-2019-11741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11741"
}
],
"links": [],
"reference": "CERTFR-2019-AVI-421",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Mozilla Firefox.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, une ex\u00e9cution de code\narbitraire et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Mozilla Firefox",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa 2019-27 du 03 septembre 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-27/"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Mozilla mfsa 2019-25 du 03 septembre 2019",
"url": "https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/"
}
]
}
BDU:2020-01396
Vulnerability from fstec - Published: 27.09.2019{
"CVSS 2.0": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Canonical Ltd., \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f, \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb, Novell Inc., Mozilla Corp., \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb, \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "16.04 LTS (Ubuntu), 9 (Debian GNU/Linux), 18.04 LTS (Ubuntu), 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (Astra Linux Special Edition), 19.04 (Ubuntu), 15.0 (OpenSUSE Leap), 15.1 (OpenSUSE Leap), 8 (Debian GNU/Linux), \u0434\u043e 68.1 (Thunderbird), \u0434\u043e 60.9 (Thunderbird), \u0434\u043e 68.1 (Firefox ESR), \u0434\u043e 69 (Firefox), 1.0 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb), - (\u0410\u043b\u044c\u0442 8 \u0421\u041f), \u0434\u043e 16.01.2023 (\u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Novell Inc.:\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\n\n\u0414\u043b\u044f Ubuntu:\nhttps://usn.ubuntu.com/4150-1/\n\n\u0414\u043b\u044f Firefox:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 69.0.2-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Firefox ESR:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 68.1.0esr-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Thunderbird:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e 1:60.9.0-1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Debian:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0434\u043e \u0430\u043a\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f Astra Linux:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 firefox) \u0434\u043e 68.2.0esr-1~deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 thunderbird) \u0434\u043e 68.2.0esr-1~deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f (\u043f\u0430\u043a\u0435\u0442\u0430 firefox-esr) \u0434\u043e 68.2.0esr-1~deb10u1 \u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 \u043f\u043e\u0437\u0434\u043d\u0435\u0439 \u0432\u0435\u0440\u0441\u0438\u0438\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb: https://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\n\n\u0414\u043b\u044f \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb:\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f firefox-esr \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 91.13.0esr+repack-1~deb10u1.osnova1.strelets\n\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f thunderbird \u0434\u043e \u0432\u0435\u0440\u0441\u0438\u0438 1:91.13.0+repack-1~deb10u1.osnova1.strelets\n\n\u0414\u043b\u044f \u041e\u0421 \u0410\u043b\u044c\u0442 8 \u0421\u041f: \u0443\u0441\u0442\u0430\u043d\u043e\u0432\u043a\u0430 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u0437 \u043f\u0443\u0431\u043b\u0438\u0447\u043d\u043e\u0433\u043e \u0440\u0435\u043f\u043e\u0437\u0438\u0442\u043e\u0440\u0438\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "27.09.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "16.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "10.04.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-01396",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2019-11742",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Ubuntu, Debian GNU/Linux, Astra Linux Special Edition (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), OpenSUSE Leap, Thunderbird, Firefox ESR, Firefox, \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), \u0410\u043b\u044c\u0442 8 \u0421\u041f (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Canonical Ltd. Ubuntu 16.04 LTS , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 9 , Canonical Ltd. Ubuntu 18.04 LTS , \u041e\u041e\u041e \u00ab\u0420\u0443\u0441\u0411\u0418\u0422\u0435\u0445-\u0410\u0441\u0442\u0440\u0430\u00bb Astra Linux Special Edition 1.6 \u00ab\u0421\u043c\u043e\u043b\u0435\u043d\u0441\u043a\u00bb (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u2116369), Canonical Ltd. Ubuntu 19.04 , Novell Inc. OpenSUSE Leap 15.0 , Novell Inc. OpenSUSE Leap 15.1 , \u0421\u043e\u043e\u0431\u0449\u0435\u0441\u0442\u0432\u043e \u0441\u0432\u043e\u0431\u043e\u0434\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Debian GNU/Linux 8 , \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb 1.0 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177), \u0410\u041e \u00ab\u0418\u0412\u041a\u00bb \u0410\u043b\u044c\u0442 8 \u0421\u041f - (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21164305), \u0410\u041e \u00ab\u041a\u043e\u043d\u0446\u0435\u0440\u043d \u0412\u041d\u0418\u0418\u041d\u0421\u00bb \u041e\u0421 \u041e\u041d \u00ab\u0421\u0442\u0440\u0435\u043b\u0435\u0446\u00bb \u0434\u043e 16.01.2023 (\u0437\u0430\u043f\u0438\u0441\u044c \u0432 \u0435\u0434\u0438\u043d\u043e\u043c \u0440\u0435\u0435\u0441\u0442\u0440\u0435 \u0440\u043e\u0441\u0441\u0438\u0439\u0441\u043a\u0438\u0445 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c \u21166177)",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0439 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0441\u0444\u0435\u0440\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0445",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0412\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0444\u0443\u043d\u043a\u0446\u0438\u0439 \u0438\u0437 \u043d\u0435\u0434\u043e\u0441\u0442\u043e\u0432\u0435\u0440\u043d\u043e\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u043e\u0439 \u043e\u0431\u043b\u0430\u0441\u0442\u0438 (CWE-829)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u0435\u0431-\u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432 Firefox, Firefox ESR \u0438 \u043f\u043e\u0447\u0442\u043e\u0432\u043e\u0433\u043e \u043a\u043b\u0438\u0435\u043d\u0442\u0430 Thunderbird \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435\u043c \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u0438\u0437 \u043d\u0435\u043d\u0430\u0434\u0435\u0436\u043d\u043e\u0439 \u0443\u043f\u0440\u0430\u0432\u043b\u044f\u044e\u0449\u0435\u0439 \u0441\u0444\u0435\u0440\u044b. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u043e\u043a\u0430\u0437\u0430\u0442\u044c \u0432\u043e\u0437\u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0435 \u043d\u0430 \u0446\u0435\u043b\u043e\u0441\u0442\u043d\u043e\u0441\u0442\u044c \u0434\u0430\u043d\u043d\u044b\u0445",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u043c\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2019-11742\nhttps://security-tracker.debian.org/tracker/CVE-2019-11742\nhttps://wiki.astralinux.ru/astra-linux-se16-bulletin-20200327SE16\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html\nhttp://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html\nhttps://usn.ubuntu.com/4150-1/\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#kumulyativnoe-obnovlenie\nhttps://strelets.net/patchi-i-obnovleniya-bezopasnosti#16012023\nhttps://altsp.su/obnovleniya-bezopasnosti/",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-829",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}
CNVD-2019-30438
Vulnerability from cnvd - Published: 2019-09-05厂商已发布了漏洞修复程序,请及时关注更新: https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/
| Name | Mozilla Firefox <69 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2019-11742"
}
},
"description": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\n\nMozilla Firefox 69\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7a83\u53d6\u8de8\u57df\u7684\u56fe\u50cf\u3002",
"discovererName": "Paul Stone",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.mozilla.org/en-US/security/advisories/mfsa2019-25/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2019-30438",
"openTime": "2019-09-05",
"patchDescription": "Mozilla Firefox\u662f\u7f8e\u56fdMozilla\u57fa\u91d1\u4f1a\u7684\u4e00\u6b3e\u5f00\u6e90Web\u6d4f\u89c8\u5668\u3002\r\n\r\nMozilla Firefox 69\u4e4b\u524d\u7248\u672c\u4e2d\u5b58\u5728\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7a83\u53d6\u8de8\u57df\u7684\u56fe\u50cf\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Mozilla Firefox\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff08CNVD-2019-30438\uff09\u7684\u8865\u4e01",
"products": {
"product": "Mozilla Firefox \u003c69"
},
"referenceLink": "https://vigilance.fr/vulnerability/Firefox-multiple-vulnerabilities-30233",
"serverity": "\u4e2d",
"submitTime": "2019-09-05",
"title": "Mozilla Firefox\u672a\u6388\u6743\u8bbf\u95ee\u6f0f\u6d1e\uff08CNVD-2019-30438\uff09"
}
FKIE_CVE-2019-11742
Vulnerability from fkie_nvd - Published: 2019-09-27 18:15 - Updated: 2025-11-25 17:50| Vendor | Product | Version | |
|---|---|---|---|
| mozilla | firefox | * | |
| mozilla | firefox | * | |
| mozilla | firefox_esr | * | |
| mozilla | thunderbird | * | |
| mozilla | thunderbird | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D231E5FC-4EBD-425A-95A9-634A155E2A33",
"versionEndExcluding": "60.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"matchCriteriaId": "299AA921-46BD-4E9F-8D74-F304F44C6EB4",
"versionEndExcluding": "69.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FE2AF870-C78F-49CA-B92B-F2E82F1C0B98",
"versionEndExcluding": "68.1.0",
"versionStartIncluding": "68.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "6767554B-7534-4C6A-8E34-F389CD3B8934",
"versionEndExcluding": "60.9.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1BA30451-E9AB-4FAE-AA49-91FCCFBE3377",
"versionEndExcluding": "68.1.0",
"versionStartIncluding": "68.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1."
},
{
"lang": "es",
"value": "Se presenta una violaci\u00f3n de la pol\u00edtica del mismo origen, que permite el robo de im\u00e1genes de origen cruzado por medio de una combinaci\u00f3n de filtros SVG y un elemento \u0026lt;canvas\u0026gt; debido a un error en c\u00f3mo es aplicada la pol\u00edtica del mismo origen para el contenido de imagen en la memoria cach\u00e9. La violaci\u00f3n de la pol\u00edtica del mismo origen resultante podr\u00eda permitir el robo de datos. Esta vulnerabilidad afecta a Firefox versiones anteriores a 69, Thunderbird versiones anteriores a 68.1, Thunderbird versiones anteriores a 60.9, Firefox versiones anteriores a 60.9 y Firefox ESR versiones anteriores a 68.1."
}
],
"id": "CVE-2019-11742",
"lastModified": "2025-11-25T17:50:16.803",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-09-27T18:15:11.943",
"references": [
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"source": "security@mozilla.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"source": "security@mozilla.org",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"source": "security@mozilla.org",
"url": "https://security.gentoo.org/glsa/201911-07"
},
{
"source": "security@mozilla.org",
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"source": "security@mozilla.org",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.gentoo.org/glsa/201911-07"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
}
],
"sourceIdentifier": "security@mozilla.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-VCF4-987Q-QJ6P
Vulnerability from github – Published: 2022-05-24 16:57 – Updated: 2024-04-04 02:01A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a <canvas> element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox < 69, Thunderbird < 68.1, Thunderbird < 60.9, Firefox ESR < 60.9, and Firefox ESR < 68.1.
{
"affected": [],
"aliases": [
"CVE-2019-11742"
],
"database_specific": {
"cwe_ids": [
"CWE-829"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-09-27T18:15:00Z",
"severity": "MODERATE"
},
"details": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"id": "GHSA-vcf4-987q-qj6p",
"modified": "2024-04-04T02:01:39Z",
"published": "2022-05-24T16:57:03Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2019-11742"
},
{
"type": "WEB",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"type": "WEB",
"url": "https://security.gentoo.org/glsa/201911-07"
},
{
"type": "WEB",
"url": "https://usn.ubuntu.com/4150-1"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29"
},
{
"type": "WEB",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"type": "CVSS_V3"
}
]
}
GSD-2019-11742
Vulnerability from gsd - Updated: 2023-12-13 01:24{
"GSD": {
"alias": "CVE-2019-11742",
"description": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"id": "GSD-2019-11742",
"references": [
"https://www.suse.com/security/cve/CVE-2019-11742.html",
"https://www.debian.org/security/2019/dsa-4523",
"https://www.debian.org/security/2019/dsa-4516",
"https://access.redhat.com/errata/RHSA-2019:2807",
"https://access.redhat.com/errata/RHSA-2019:2774",
"https://access.redhat.com/errata/RHSA-2019:2773",
"https://access.redhat.com/errata/RHSA-2019:2729",
"https://access.redhat.com/errata/RHSA-2019:2694",
"https://access.redhat.com/errata/RHSA-2019:2663",
"https://ubuntu.com/security/CVE-2019-11742",
"https://advisories.mageia.org/CVE-2019-11742.html",
"https://security.archlinux.org/CVE-2019-11742",
"https://linux.oracle.com/cve/CVE-2019-11742.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2019-11742"
],
"details": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"id": "GSD-2019-11742",
"modified": "2023-12-13T01:24:01.484594Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-11742",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "69"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.1"
},
{
"version_affected": "\u003c",
"version_value": "60.9"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.9"
},
{
"version_affected": "\u003c",
"version_value": "68.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Same-origin policy violation with SVG filters and canvas to steal cross-origin images"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715",
"refsource": "MISC",
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-25/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-27/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-26/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-29/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-30/",
"refsource": "CONFIRM",
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"name": "openSUSE-SU-2019:2248",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2249",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "openSUSE-SU-2019:2251",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"name": "openSUSE-SU-2019:2260",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"name": "USN-4150-1",
"refsource": "UBUNTU",
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"name": "GLSA-201911-07",
"refsource": "GENTOO",
"url": "https://security.gentoo.org/glsa/201911-07"
}
]
}
},
"mozilla.org": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-11742"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Firefox",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "69"
}
]
}
},
{
"product_name": "Firefox ESR",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "68.1"
},
{
"version_affected": "\u003c",
"version_value": "60.9"
}
]
}
},
{
"product_name": "Thunderbird",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_value": "60.9"
},
{
"version_affected": "\u003c",
"version_value": "68.1"
}
]
}
}
]
},
"vendor_name": "Mozilla"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u003ccode\u003e\u0026lt;canvas\u0026gt;\u003c/code\u003e element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 68.1, Firefox ESR \u003c 60.9, Thunderbird \u003c 60.9, and Thunderbird \u003c 68.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Same-origin policy violation with SVG filters and canvas to steal cross-origin images"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox_esr:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "68.1.0",
"versionStartIncluding": "68.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "60.9.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "68.1.0",
"versionStartIncluding": "68.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "69.0",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@mozilla.org",
"ID": "CVE-2019-11742"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-829"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-29/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-29/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-30/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-30/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-27/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-27/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-25/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-25/"
},
{
"name": "https://www.mozilla.org/security/advisories/mfsa2019-26/",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.mozilla.org/security/advisories/mfsa2019-26/"
},
{
"name": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Permissions Required",
"Vendor Advisory"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=1559715"
},
{
"name": "openSUSE-SU-2019:2249",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00009.html"
},
{
"name": "openSUSE-SU-2019:2248",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00010.html"
},
{
"name": "openSUSE-SU-2019:2251",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00011.html"
},
{
"name": "openSUSE-SU-2019:2260",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00017.html"
},
{
"name": "USN-4150-1",
"refsource": "UBUNTU",
"tags": [],
"url": "https://usn.ubuntu.com/4150-1/"
},
{
"name": "GLSA-201911-07",
"refsource": "GENTOO",
"tags": [],
"url": "https://security.gentoo.org/glsa/201911-07"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2019-10-04T18:15Z",
"publishedDate": "2019-09-27T18:15Z"
}
}
}
OPENSUSE-SU-2019:2248-1
Vulnerability from csaf_opensuse - Published: 2019-10-04 10:23 - Updated: 2019-10-04 10:23| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaThunderbird to version 68.1.1 fixes the following issues:\n \n- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)\n- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)\n- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)\n- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)\n- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)\n- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)\n- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)\n- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)\n- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)\n- CVE-2019-11721: Fixed domain spoofing through unicode latin \u0027kra\u0027 character. (bsc#1140868)\n- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)\n- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)\n- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)\n- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)\n- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)\n- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)\n- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)\n- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)\n- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)\n- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)\n- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)\n- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)\n- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)\n- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)\n- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2248",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2248-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2248-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2248-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5/#QT7HMZ3VUEMJ463IILXJ7LOGN6RQAID5"
},
{
"category": "self",
"summary": "SUSE Bug 1140868",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "self",
"summary": "SUSE Bug 1141322",
"url": "https://bugzilla.suse.com/1141322"
},
{
"category": "self",
"summary": "SUSE Bug 1149296",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "self",
"summary": "SUSE Bug 1149297",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "self",
"summary": "SUSE Bug 1149298",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "self",
"summary": "SUSE Bug 1149299",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "self",
"summary": "SUSE Bug 1149303",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "self",
"summary": "SUSE Bug 1149304",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "self",
"summary": "SUSE Bug 1150939",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "self",
"summary": "SUSE Bug 1152375",
"url": "https://bugzilla.suse.com/1152375"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11709 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11711 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11712 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11713 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11715 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11717 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11723 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11724 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11725 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11728 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11729 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11730 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11739 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11744 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11752 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11755/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2019-10-04T10:23:43Z",
"generator": {
"date": "2019-10-04T10:23:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2248-1",
"initial_release_date": "2019-10-04T10:23:43Z",
"revision_history": [
{
"date": "2019-10-04T10:23:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64"
}
},
{
"category": "product_version",
"name": "enigmail-2.1.2-lp150.34.1.x86_64",
"product": {
"name": "enigmail-2.1.2-lp150.34.1.x86_64",
"product_id": "enigmail-2.1.2-lp150.34.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.0",
"product": {
"name": "openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "enigmail-2.1.2-lp150.34.1.x86_64 as component of openSUSE Leap 15.0",
"product_id": "openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
},
"product_reference": "enigmail-2.1.2-lp150.34.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11709"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11709",
"url": "https://www.suse.com/security/cve/CVE-2019-11709"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11709",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11709"
},
{
"cve": "CVE-2019-11710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11710"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11710",
"url": "https://www.suse.com/security/cve/CVE-2019-11710"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11710",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11710"
},
{
"cve": "CVE-2019-11711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11711"
}
],
"notes": [
{
"category": "general",
"text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11711",
"url": "https://www.suse.com/security/cve/CVE-2019-11711"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11711",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11711"
},
{
"cve": "CVE-2019-11712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11712"
}
],
"notes": [
{
"category": "general",
"text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11712",
"url": "https://www.suse.com/security/cve/CVE-2019-11712"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11712",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11712"
},
{
"cve": "CVE-2019-11713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11713"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11713",
"url": "https://www.suse.com/security/cve/CVE-2019-11713"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11713",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11713"
},
{
"cve": "CVE-2019-11714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11714"
}
],
"notes": [
{
"category": "general",
"text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11714",
"url": "https://www.suse.com/security/cve/CVE-2019-11714"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11714",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11714"
},
{
"cve": "CVE-2019-11715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11715"
}
],
"notes": [
{
"category": "general",
"text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11715",
"url": "https://www.suse.com/security/cve/CVE-2019-11715"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11715",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11715"
},
{
"cve": "CVE-2019-11716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11716"
}
],
"notes": [
{
"category": "general",
"text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11716",
"url": "https://www.suse.com/security/cve/CVE-2019-11716"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11716",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11716"
},
{
"cve": "CVE-2019-11717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11717"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11717",
"url": "https://www.suse.com/security/cve/CVE-2019-11717"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11717",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11717"
},
{
"cve": "CVE-2019-11719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11719"
}
],
"notes": [
{
"category": "general",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11719",
"url": "https://www.suse.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11719",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11720"
}
],
"notes": [
{
"category": "general",
"text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11720",
"url": "https://www.suse.com/security/cve/CVE-2019-11720"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11720",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11720"
},
{
"cve": "CVE-2019-11721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11721"
}
],
"notes": [
{
"category": "general",
"text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11721",
"url": "https://www.suse.com/security/cve/CVE-2019-11721"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11721",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11721"
},
{
"cve": "CVE-2019-11723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11723"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11723",
"url": "https://www.suse.com/security/cve/CVE-2019-11723"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11723",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11723"
},
{
"cve": "CVE-2019-11724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11724"
}
],
"notes": [
{
"category": "general",
"text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11724",
"url": "https://www.suse.com/security/cve/CVE-2019-11724"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11724",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11724"
},
{
"cve": "CVE-2019-11725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11725"
}
],
"notes": [
{
"category": "general",
"text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11725",
"url": "https://www.suse.com/security/cve/CVE-2019-11725"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11725",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11725"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11728"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11728",
"url": "https://www.suse.com/security/cve/CVE-2019-11728"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11728",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11728"
},
{
"cve": "CVE-2019-11729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11729"
}
],
"notes": [
{
"category": "general",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11729",
"url": "https://www.suse.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11729",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11729"
},
{
"cve": "CVE-2019-11730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11730"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11730",
"url": "https://www.suse.com/security/cve/CVE-2019-11730"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11730",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11730"
},
{
"cve": "CVE-2019-11739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11739"
}
],
"notes": [
{
"category": "general",
"text": "Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird \u003c 68.1 and Thunderbird \u003c 60.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11739",
"url": "https://www.suse.com/security/cve/CVE-2019-11739"
},
{
"category": "external",
"summary": "SUSE Bug 1150939 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11739"
},
{
"cve": "CVE-2019-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11740"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11740",
"url": "https://www.suse.com/security/cve/CVE-2019-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1149299 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11740"
},
{
"cve": "CVE-2019-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11742"
}
],
"notes": [
{
"category": "general",
"text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11742",
"url": "https://www.suse.com/security/cve/CVE-2019-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1149303 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11742"
},
{
"cve": "CVE-2019-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11743"
}
],
"notes": [
{
"category": "general",
"text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11743",
"url": "https://www.suse.com/security/cve/CVE-2019-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1149298 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11743"
},
{
"cve": "CVE-2019-11744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11744"
}
],
"notes": [
{
"category": "general",
"text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11744",
"url": "https://www.suse.com/security/cve/CVE-2019-11744"
},
{
"category": "external",
"summary": "SUSE Bug 1149304 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11744"
},
{
"cve": "CVE-2019-11746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11746"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11746",
"url": "https://www.suse.com/security/cve/CVE-2019-11746"
},
{
"category": "external",
"summary": "SUSE Bug 1149297 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11746"
},
{
"cve": "CVE-2019-11752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11752"
}
],
"notes": [
{
"category": "general",
"text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11752",
"url": "https://www.suse.com/security/cve/CVE-2019-11752"
},
{
"category": "external",
"summary": "SUSE Bug 1149296 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11752"
},
{
"cve": "CVE-2019-11755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11755"
}
],
"notes": [
{
"category": "general",
"text": "A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird \u003c 68.1.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11755",
"url": "https://www.suse.com/security/cve/CVE-2019-11755"
},
{
"category": "external",
"summary": "SUSE Bug 1152375 for CVE-2019-11755",
"url": "https://bugzilla.suse.com/1152375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.0:MozillaThunderbird-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-buildsymbols-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-common-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:MozillaThunderbird-translations-other-68.1.1-lp150.3.51.1.x86_64",
"openSUSE Leap 15.0:enigmail-2.1.2-lp150.34.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:23:43Z",
"details": "important"
}
],
"title": "CVE-2019-11755"
}
]
}
OPENSUSE-SU-2019:2249-1
Vulnerability from csaf_opensuse - Published: 2019-10-04 10:24 - Updated: 2019-10-04 10:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaThunderbird",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaThunderbird to version 68.1.1 fixes the following issues:\n \n- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)\n- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)\n- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)\n- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)\n- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)\n- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)\n- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)\n- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)\n- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)\n- CVE-2019-11721: Fixed domain spoofing through unicode latin \u0027kra\u0027 character. (bsc#1140868)\n- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)\n- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)\n- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)\n- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)\n- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)\n- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)\n- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)\n- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)\n- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)\n- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)\n- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)\n- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)\n- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)\n- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)\n- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2249",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2249-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2249-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2249-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM"
},
{
"category": "self",
"summary": "SUSE Bug 1140868",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "self",
"summary": "SUSE Bug 1141322",
"url": "https://bugzilla.suse.com/1141322"
},
{
"category": "self",
"summary": "SUSE Bug 1149296",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "self",
"summary": "SUSE Bug 1149297",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "self",
"summary": "SUSE Bug 1149298",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "self",
"summary": "SUSE Bug 1149299",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "self",
"summary": "SUSE Bug 1149303",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "self",
"summary": "SUSE Bug 1149304",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "self",
"summary": "SUSE Bug 1150939",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "self",
"summary": "SUSE Bug 1152375",
"url": "https://bugzilla.suse.com/1152375"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11709 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11709/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11711 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11711/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11712 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11712/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11713 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11715 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11715/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11717 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11717/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11719 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11719/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11723 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11724 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11725 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11728 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11729 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11729/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11730 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11730/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11739 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11739/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11744 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11752 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11755 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11755/"
}
],
"title": "Security update for MozillaThunderbird",
"tracking": {
"current_release_date": "2019-10-04T10:24:16Z",
"generator": {
"date": "2019-10-04T10:24:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2249-1",
"initial_release_date": "2019-10-04T10:24:16Z",
"revision_history": [
{
"date": "2019-10-04T10:24:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"product": {
"name": "MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"product_id": "MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"product": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"product_id": "MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"product_id": "MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"product": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"product_id": "MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64"
}
},
{
"category": "product_version",
"name": "enigmail-2.1.2-lp151.2.6.1.x86_64",
"product": {
"name": "enigmail-2.1.2-lp151.2.6.1.x86_64",
"product_id": "enigmail-2.1.2-lp151.2.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64"
},
"product_reference": "MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64"
},
"product_reference": "MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64"
},
"product_reference": "MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "enigmail-2.1.2-lp151.2.6.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
},
"product_reference": "enigmail-2.1.2-lp151.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11709",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11709"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11709",
"url": "https://www.suse.com/security/cve/CVE-2019-11709"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11709",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11709"
},
{
"cve": "CVE-2019-11710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11710"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11710",
"url": "https://www.suse.com/security/cve/CVE-2019-11710"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11710",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11710"
},
{
"cve": "CVE-2019-11711",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11711"
}
],
"notes": [
{
"category": "general",
"text": "When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11711",
"url": "https://www.suse.com/security/cve/CVE-2019-11711"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11711",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11711"
},
{
"cve": "CVE-2019-11712",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11712"
}
],
"notes": [
{
"category": "general",
"text": "POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11712",
"url": "https://www.suse.com/security/cve/CVE-2019-11712"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11712",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11712"
},
{
"cve": "CVE-2019-11713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11713"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11713",
"url": "https://www.suse.com/security/cve/CVE-2019-11713"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11713",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11713"
},
{
"cve": "CVE-2019-11714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11714"
}
],
"notes": [
{
"category": "general",
"text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11714",
"url": "https://www.suse.com/security/cve/CVE-2019-11714"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11714",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11714"
},
{
"cve": "CVE-2019-11715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11715"
}
],
"notes": [
{
"category": "general",
"text": "Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11715",
"url": "https://www.suse.com/security/cve/CVE-2019-11715"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11715",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11715"
},
{
"cve": "CVE-2019-11716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11716"
}
],
"notes": [
{
"category": "general",
"text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11716",
"url": "https://www.suse.com/security/cve/CVE-2019-11716"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11716",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11716"
},
{
"cve": "CVE-2019-11717",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11717"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where the caret (\"^\") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11717",
"url": "https://www.suse.com/security/cve/CVE-2019-11717"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11717",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11717"
},
{
"cve": "CVE-2019-11719",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11719"
}
],
"notes": [
{
"category": "general",
"text": "When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11719",
"url": "https://www.suse.com/security/cve/CVE-2019-11719"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11719",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11720"
}
],
"notes": [
{
"category": "general",
"text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11720",
"url": "https://www.suse.com/security/cve/CVE-2019-11720"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11720",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11720"
},
{
"cve": "CVE-2019-11721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11721"
}
],
"notes": [
{
"category": "general",
"text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11721",
"url": "https://www.suse.com/security/cve/CVE-2019-11721"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11721",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11721"
},
{
"cve": "CVE-2019-11723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11723"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11723",
"url": "https://www.suse.com/security/cve/CVE-2019-11723"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11723",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11723"
},
{
"cve": "CVE-2019-11724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11724"
}
],
"notes": [
{
"category": "general",
"text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11724",
"url": "https://www.suse.com/security/cve/CVE-2019-11724"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11724",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11724"
},
{
"cve": "CVE-2019-11725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11725"
}
],
"notes": [
{
"category": "general",
"text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11725",
"url": "https://www.suse.com/security/cve/CVE-2019-11725"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11725",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11725"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11728"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11728",
"url": "https://www.suse.com/security/cve/CVE-2019-11728"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11728",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11728"
},
{
"cve": "CVE-2019-11729",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11729"
}
],
"notes": [
{
"category": "general",
"text": "Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11729",
"url": "https://www.suse.com/security/cve/CVE-2019-11729"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11729",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11729"
},
{
"cve": "CVE-2019-11730",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11730"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app\u0027s predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11730",
"url": "https://www.suse.com/security/cve/CVE-2019-11730"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11730",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11730"
},
{
"cve": "CVE-2019-11739",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11739"
}
],
"notes": [
{
"category": "general",
"text": "Encrypted S/MIME parts in a crafted multipart/alternative message can leak plaintext when included in a a HTML reply/forward. This vulnerability affects Thunderbird \u003c 68.1 and Thunderbird \u003c 60.9.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11739",
"url": "https://www.suse.com/security/cve/CVE-2019-11739"
},
{
"category": "external",
"summary": "SUSE Bug 1150939 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150939"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11739",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-11739"
},
{
"cve": "CVE-2019-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11740"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11740",
"url": "https://www.suse.com/security/cve/CVE-2019-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1149299 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11740"
},
{
"cve": "CVE-2019-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11742"
}
],
"notes": [
{
"category": "general",
"text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11742",
"url": "https://www.suse.com/security/cve/CVE-2019-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1149303 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11742"
},
{
"cve": "CVE-2019-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11743"
}
],
"notes": [
{
"category": "general",
"text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11743",
"url": "https://www.suse.com/security/cve/CVE-2019-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1149298 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "moderate"
}
],
"title": "CVE-2019-11743"
},
{
"cve": "CVE-2019-11744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11744"
}
],
"notes": [
{
"category": "general",
"text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11744",
"url": "https://www.suse.com/security/cve/CVE-2019-11744"
},
{
"category": "external",
"summary": "SUSE Bug 1149304 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11744"
},
{
"cve": "CVE-2019-11746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11746"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11746",
"url": "https://www.suse.com/security/cve/CVE-2019-11746"
},
{
"category": "external",
"summary": "SUSE Bug 1149297 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11746"
},
{
"cve": "CVE-2019-11752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11752"
}
],
"notes": [
{
"category": "general",
"text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11752",
"url": "https://www.suse.com/security/cve/CVE-2019-11752"
},
{
"category": "external",
"summary": "SUSE Bug 1149296 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11752"
},
{
"cve": "CVE-2019-11755",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11755"
}
],
"notes": [
{
"category": "general",
"text": "A crafted S/MIME message consisting of an inner encryption layer and an outer SignedData layer was shown as having a valid digital signature, although the signer might have had no access to the contents of the encrypted message, and might have stripped a different signature from the encrypted message. Previous versions had only suppressed showing a digital signature for messages with an outer multipart/signed layer. This vulnerability affects Thunderbird \u003c 68.1.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11755",
"url": "https://www.suse.com/security/cve/CVE-2019-11755"
},
{
"category": "external",
"summary": "SUSE Bug 1152375 for CVE-2019-11755",
"url": "https://bugzilla.suse.com/1152375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaThunderbird-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-buildsymbols-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-common-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:MozillaThunderbird-translations-other-68.1.1-lp151.2.13.1.x86_64",
"openSUSE Leap 15.1:enigmail-2.1.2-lp151.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T10:24:16Z",
"details": "important"
}
],
"title": "CVE-2019-11755"
}
]
}
OPENSUSE-SU-2019:2251-1
Vulnerability from csaf_opensuse - Published: 2019-10-04 22:24 - Updated: 2019-10-04 22:24| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for MozillaFirefox",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for MozillaFirefox to 68.1 fixes the following issues:\n\nSecurity issues fixed:\n\n- CVE-2019-9811: Fixed a sandbox escape via installation of malicious language pack. (bsc#1140868)\n- CVE-2019-9812: Fixed a sandbox escape through Firefox Sync. (bsc#1149294)\n- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11714: Fixed a potentially exploitable crash in Necko. (bsc#1140868)\n- CVE-2019-11716: Fixed a sandbox bypass. (bsc#1140868)\n- CVE-2019-11718: Fixed inadequate sanitation in the Activity Stream component. (bsc#1140868)\n- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)\n- CVE-2019-11721: Fixed a homograph domain spoofing issue through unicode latin \u0027kra\u0027 character. (bsc#1140868)\n- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)\n- CVE-2019-11724: Fixed an outdated permission, granting access to retired site input.mozilla.org. (bsc#1140868)\n- CVE-2019-11725: Fixed a Safebrowsing bypass involving WebSockets. (bsc#1140868)\n- CVE-2019-11727: Fixed a vulnerability where it possible to force NSS to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. (bsc#1141322)\n- CVE-2019-11728: Fixed an improper handling of the Alt-Svc header that allowed remote port scans. (bsc#1140868)\n- CVE-2019-11733: Fixed an insufficient protection of stored passwords in \u0027Saved Logins\u0027. (bnc#1145665)\n- CVE-2019-11735: Fixed several memory safety bugs. (bnc#1149293)\n- CVE-2019-11736: Fixed a file manipulation and privilege escalation in Mozilla Maintenance Service. (bnc#1149292) \n- CVE-2019-11738: Fixed a content security policy bypass through hash-based sources in directives. (bnc#1149302)\n- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)\n- CVE-2019-11742: Fixed a same-origin policy violation involving SVG filters and canvas to steal cross-origin images. (bsc#1149303)\n- CVE-2019-11743: Fixed a timing side-channel attack on cross-origin information, utilizing unload event attributes. (bsc#1149298)\n- CVE-2019-11744: Fixed an XSS caused by breaking out of title and textarea elements using innerHTML. (bsc#1149304)\n- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)\n- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)\n- CVE-2019-11753: Fixed a privilege escalation with Mozilla Maintenance Service in custom Firefox installation location. (bsc#1149295)\n\nNon-security issues fixed:\n\t \n- Latest update now also released for s390x. (bsc#1109465)\n- Fixed a segmentation fault on s390vsl082. (bsc#1117473)\n- Fixed a crash on SLES15 s390x. (bsc#1124525)\n- Fixed a segmentation fault. (bsc#1133810)\n\nThis update was imported from the SUSE:SLE-15:Update update project.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2019-2251",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2019_2251-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2019:2251-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2019:2251-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K/#D6AIQRJID7DIPCU5KTEO6R57LSZRFM6K"
},
{
"category": "self",
"summary": "SUSE Bug 1109465",
"url": "https://bugzilla.suse.com/1109465"
},
{
"category": "self",
"summary": "SUSE Bug 1117473",
"url": "https://bugzilla.suse.com/1117473"
},
{
"category": "self",
"summary": "SUSE Bug 1123482",
"url": "https://bugzilla.suse.com/1123482"
},
{
"category": "self",
"summary": "SUSE Bug 1124525",
"url": "https://bugzilla.suse.com/1124525"
},
{
"category": "self",
"summary": "SUSE Bug 1133810",
"url": "https://bugzilla.suse.com/1133810"
},
{
"category": "self",
"summary": "SUSE Bug 1138688",
"url": "https://bugzilla.suse.com/1138688"
},
{
"category": "self",
"summary": "SUSE Bug 1140868",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "self",
"summary": "SUSE Bug 1141322",
"url": "https://bugzilla.suse.com/1141322"
},
{
"category": "self",
"summary": "SUSE Bug 1145665",
"url": "https://bugzilla.suse.com/1145665"
},
{
"category": "self",
"summary": "SUSE Bug 1149292",
"url": "https://bugzilla.suse.com/1149292"
},
{
"category": "self",
"summary": "SUSE Bug 1149293",
"url": "https://bugzilla.suse.com/1149293"
},
{
"category": "self",
"summary": "SUSE Bug 1149294",
"url": "https://bugzilla.suse.com/1149294"
},
{
"category": "self",
"summary": "SUSE Bug 1149295",
"url": "https://bugzilla.suse.com/1149295"
},
{
"category": "self",
"summary": "SUSE Bug 1149296",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "self",
"summary": "SUSE Bug 1149297",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "self",
"summary": "SUSE Bug 1149298",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "self",
"summary": "SUSE Bug 1149299",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "self",
"summary": "SUSE Bug 1149302",
"url": "https://bugzilla.suse.com/1149302"
},
{
"category": "self",
"summary": "SUSE Bug 1149303",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "self",
"summary": "SUSE Bug 1149304",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "self",
"summary": "SUSE Bug 1149323",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11710 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11710/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11714 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11716 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11716/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11718 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11718/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11720 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11721 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11721/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11723 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11723/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11724 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11724/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11725 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11727 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11727/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11728 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11728/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11733 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11733/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11735 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11735/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11736 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11736/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11738 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11738/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11740 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11740/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11742 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11742/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11743 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11744 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11744/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11746 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11746/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11747 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11747/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11748 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11748/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11749 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11749/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11750 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11750/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11751 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11751/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11752 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11752/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-11753 page",
"url": "https://www.suse.com/security/cve/CVE-2019-11753/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9811 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9811/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2019-9812 page",
"url": "https://www.suse.com/security/cve/CVE-2019-9812/"
}
],
"title": "Security update for MozillaFirefox",
"tracking": {
"current_release_date": "2019-10-04T22:24:43Z",
"generator": {
"date": "2019-10-04T22:24:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2019:2251-1",
"initial_release_date": "2019-10-04T22:24:43Z",
"revision_history": [
{
"date": "2019-10-04T22:24:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-68.1.0-lp151.2.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64",
"product": {
"name": "MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64",
"product_id": "MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.1",
"product": {
"name": "openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64 as component of openSUSE Leap 15.1",
"product_id": "openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
},
"product_reference": "MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-11710",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11710"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 67. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11710",
"url": "https://www.suse.com/security/cve/CVE-2019-11710"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11710",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11710"
},
{
"cve": "CVE-2019-11714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11714"
}
],
"notes": [
{
"category": "general",
"text": "Necko can access a child on the wrong thread during UDP connections, resulting in a potentially exploitable crash in some instances. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11714",
"url": "https://www.suse.com/security/cve/CVE-2019-11714"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11714",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11714"
},
{
"cve": "CVE-2019-11716",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11716"
}
],
"notes": [
{
"category": "general",
"text": "Until explicitly accessed by script, window.globalThis is not enumerable and, as a result, is not visible to code such as Object.getOwnPropertyNames(window). Sites that deploy a sandboxing that depends on enumerating and freezing access to the window object may miss this, allowing their sandboxes to be bypassed. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11716",
"url": "https://www.suse.com/security/cve/CVE-2019-11716"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11716",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11716"
},
{
"cve": "CVE-2019-11718",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11718"
}
],
"notes": [
{
"category": "general",
"text": "Activity Stream can display content from sent from the Snippet Service website. This content is written to innerHTML on the Activity Stream page without sanitization, allowing for a potential access to other information available to the Activity Stream, such as browsing history, if the Snipper Service were compromised. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11718",
"url": "https://www.suse.com/security/cve/CVE-2019-11718"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11718",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11718"
},
{
"cve": "CVE-2019-11720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11720"
}
],
"notes": [
{
"category": "general",
"text": "Some unicode characters are incorrectly treated as whitespace during the parsing of web content instead of triggering parsing errors. This allows malicious code to then be processed, evading cross-site scripting (XSS) filtering. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11720",
"url": "https://www.suse.com/security/cve/CVE-2019-11720"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11720",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11720"
},
{
"cve": "CVE-2019-11721",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11721"
}
],
"notes": [
{
"category": "general",
"text": "The unicode latin \u0027kra\u0027 character can be used to spoof a standard \u0027k\u0027 character in the addressbar. This allows for domain spoofing attacks as do not display as punycode text, allowing for user confusion. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11721",
"url": "https://www.suse.com/security/cve/CVE-2019-11721"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11721",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11721"
},
{
"cve": "CVE-2019-11723",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11723"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists during the installation of add-ons where the initial fetch ignored the origin attributes of the browsing context. This could leak cookies in private browsing mode or across different \"containers\" for people who use the Firefox Multi-Account Containers Web Extension. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11723",
"url": "https://www.suse.com/security/cve/CVE-2019-11723"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11723",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11723"
},
{
"cve": "CVE-2019-11724",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11724"
}
],
"notes": [
{
"category": "general",
"text": "Application permissions give additional remote troubleshooting permission to the site input.mozilla.org, which has been retired and now redirects to another site. This additional permission is unnecessary and is a potential vector for malicious attacks. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11724",
"url": "https://www.suse.com/security/cve/CVE-2019-11724"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11724",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11724"
},
{
"cve": "CVE-2019-11725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11725"
}
],
"notes": [
{
"category": "general",
"text": "When a user navigates to site marked as unsafe by the Safebrowsing API, warning messages are displayed and navigation is interrupted but resources from the same site loaded through websockets are not blocked, leading to the loading of unsafe resources and bypassing safebrowsing protections. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11725",
"url": "https://www.suse.com/security/cve/CVE-2019-11725"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11725",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11725"
},
{
"cve": "CVE-2019-11727",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11727"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists where it possible to force Network Security Services (NSS) to sign CertificateVerify with PKCS#1 v1.5 signatures when those are the only ones advertised by server in CertificateRequest in TLS 1.3. PKCS#1 v1.5 signatures should not be used for TLS 1.3 messages. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11727",
"url": "https://www.suse.com/security/cve/CVE-2019-11727"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1140868"
},
{
"category": "external",
"summary": "SUSE Bug 1141322 for CVE-2019-11727",
"url": "https://bugzilla.suse.com/1141322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11728",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11728"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP Alternative Services header, Alt-Svc, can be used by a malicious site to scan all TCP ports of any host that the accessible to a user when web content is loaded. This vulnerability affects Firefox \u003c 68.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11728",
"url": "https://www.suse.com/security/cve/CVE-2019-11728"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-11728",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11728"
},
{
"cve": "CVE-2019-11733",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11733"
}
],
"notes": [
{
"category": "general",
"text": "When a master password is set, it is required to be entered again before stored passwords can be accessed in the \u0027Saved Logins\u0027 dialog. It was found that locally stored passwords can be copied to the clipboard thorough the \u0027copy password\u0027 context menu item without re-entering the master password if the master password had been previously entered in the same session, allowing for potential theft of stored passwords. This vulnerability affects Firefox \u003c 68.0.2 and Firefox ESR \u003c 68.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11733",
"url": "https://www.suse.com/security/cve/CVE-2019-11733"
},
{
"category": "external",
"summary": "SUSE Bug 1145665 for CVE-2019-11733",
"url": "https://bugzilla.suse.com/1145665"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.0"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11733"
},
{
"cve": "CVE-2019-11735",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11735"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68 and Firefox ESR 68. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11735",
"url": "https://www.suse.com/security/cve/CVE-2019-11735"
},
{
"category": "external",
"summary": "SUSE Bug 1149293 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149293"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11735",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11735"
},
{
"cve": "CVE-2019-11736",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11736"
}
],
"notes": [
{
"category": "general",
"text": "The Mozilla Maintenance Service does not guard against files being hardlinked to another file in the updates directory, allowing for the replacement of local files, including the Maintenance Service executable, which is run with privileged access. Additionally, there was a race condition during checks for junctions and symbolic links by the Maintenance Service, allowing for potential local file and directory manipulation to be undetected in some circumstances. This allows for potential privilege escalation by a user with unprivileged local access. \u003cbr\u003e*Note: These attacks requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11736",
"url": "https://www.suse.com/security/cve/CVE-2019-11736"
},
{
"category": "external",
"summary": "SUSE Bug 1149292 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149292"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11736",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11736"
},
{
"cve": "CVE-2019-11738",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11738"
}
],
"notes": [
{
"category": "general",
"text": "If a Content Security Policy (CSP) directive is defined that uses a hash-based source that takes the empty string as input, execution of any javascript: URIs will be allowed. This could allow for malicious JavaScript content to be run, bypassing CSP permissions. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11738",
"url": "https://www.suse.com/security/cve/CVE-2019-11738"
},
{
"category": "external",
"summary": "SUSE Bug 1149302 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149302"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11738",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11738"
},
{
"cve": "CVE-2019-11740",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11740"
}
],
"notes": [
{
"category": "general",
"text": "Mozilla developers and community members reported memory safety bugs present in Firefox 68, Firefox ESR 68, and Firefox 60.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11740",
"url": "https://www.suse.com/security/cve/CVE-2019-11740"
},
{
"category": "external",
"summary": "SUSE Bug 1149299 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149299"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11740",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11740"
},
{
"cve": "CVE-2019-11742",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11742"
}
],
"notes": [
{
"category": "general",
"text": "A same-origin policy violation occurs allowing the theft of cross-origin images through a combination of SVG filters and a \u0026lt;canvas\u0026gt; element due to an error in how same-origin policy is applied to cached image content. The resulting same-origin policy violation could allow for data theft. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11742",
"url": "https://www.suse.com/security/cve/CVE-2019-11742"
},
{
"category": "external",
"summary": "SUSE Bug 1149303 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149303"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11742",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11742"
},
{
"cve": "CVE-2019-11743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11743"
}
],
"notes": [
{
"category": "general",
"text": "Navigation events were not fully adhering to the W3C\u0027s \"Navigation-Timing Level 2\" draft specification in some instances for the unload event, which restricts access to detailed timing attributes to only be same-origin. This resulted in potential cross-origin information exposure of history through timing side-channel attacks. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11743",
"url": "https://www.suse.com/security/cve/CVE-2019-11743"
},
{
"category": "external",
"summary": "SUSE Bug 1149298 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149298"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11743",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11743"
},
{
"cve": "CVE-2019-11744",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11744"
}
],
"notes": [
{
"category": "general",
"text": "Some HTML elements, such as \u0026lt;title\u0026gt; and \u0026lt;textarea\u0026gt;, can contain literal angle brackets without treating them as markup. It is possible to pass a literal closing tag to .innerHTML on these elements, and subsequent content after that will be parsed as if it were outside the tag. This can lead to XSS if a site does not filter user input as strictly for these elements as it does for other elements. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11744",
"url": "https://www.suse.com/security/cve/CVE-2019-11744"
},
{
"category": "external",
"summary": "SUSE Bug 1149304 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149304"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11744",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11744"
},
{
"cve": "CVE-2019-11746",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11746"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability can occur while manipulating video elements if the body is freed while still in use. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11746",
"url": "https://www.suse.com/security/cve/CVE-2019-11746"
},
{
"category": "external",
"summary": "SUSE Bug 1149297 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149297"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11746",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11746"
},
{
"cve": "CVE-2019-11747",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11747"
}
],
"notes": [
{
"category": "general",
"text": "The \"Forget about this site\" feature in the History pane is intended to remove all saved user data that indicates a user has visited a site. This includes removing any HTTP Strict Transport Security (HSTS) settings received from sites that use it. Due to a bug, sites on the pre-load list also have their HSTS setting removed. On the next visit to that site if the user specifies an http: URL rather than secure https: they will not be protected by the pre-loaded HSTS setting. After that visit the site\u0027s HSTS setting will be restored. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11747",
"url": "https://www.suse.com/security/cve/CVE-2019-11747"
},
{
"category": "external",
"summary": "SUSE Bug 1149301 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149301"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11747",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "low"
}
],
"title": "CVE-2019-11747"
},
{
"cve": "CVE-2019-11748",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11748"
}
],
"notes": [
{
"category": "general",
"text": "WebRTC in Firefox will honor persisted permissions given to sites for access to microphone and camera resources even when in a third-party context. In light of recent high profile vulnerabilities in other software, a decision was made to no longer persist these permissions. This avoids the possibility of trusted WebRTC resources being invisibly embedded in web content and abusing permissions previously given by users. Users will now be prompted for permissions on each use. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11748",
"url": "https://www.suse.com/security/cve/CVE-2019-11748"
},
{
"category": "external",
"summary": "SUSE Bug 1149291 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149291"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11748",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11748"
},
{
"cve": "CVE-2019-11749",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11749"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability exists in WebRTC where malicious web content can use probing techniques on the getUserMedia API using constraints to reveal device properties of cameras on the system without triggering a user prompt or notification. This allows for the potential fingerprinting of users. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11749",
"url": "https://www.suse.com/security/cve/CVE-2019-11749"
},
{
"category": "external",
"summary": "SUSE Bug 1149290 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149290"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11749",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11749"
},
{
"cve": "CVE-2019-11750",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11750"
}
],
"notes": [
{
"category": "general",
"text": "A type confusion vulnerability exists in Spidermonkey, which results in a non-exploitable crash. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11750",
"url": "https://www.suse.com/security/cve/CVE-2019-11750"
},
{
"category": "external",
"summary": "SUSE Bug 1149289 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149289"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11750",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11750"
},
{
"cve": "CVE-2019-11751",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11751"
}
],
"notes": [
{
"category": "general",
"text": "Logging-related command line parameters are not properly sanitized when Firefox is launched by another program, such as when a user clicks on malicious links in a chat application. This can be used to write a log file to an arbitrary location such as the Windows \u0027Startup\u0027 folder. \u003cbr\u003e*Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox \u003c 69 and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11751",
"url": "https://www.suse.com/security/cve/CVE-2019-11751"
},
{
"category": "external",
"summary": "SUSE Bug 1149286 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149286"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11751",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11751"
},
{
"cve": "CVE-2019-11752",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11752"
}
],
"notes": [
{
"category": "general",
"text": "It is possible to delete an IndexedDB key value and subsequently try to extract it during conversion. This results in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox \u003c 69, Thunderbird \u003c 68.1, Thunderbird \u003c 60.9, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11752",
"url": "https://www.suse.com/security/cve/CVE-2019-11752"
},
{
"category": "external",
"summary": "SUSE Bug 1149296 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149296"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1149324"
},
{
"category": "external",
"summary": "SUSE Bug 1150940 for CVE-2019-11752",
"url": "https://bugzilla.suse.com/1150940"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-11752"
},
{
"cve": "CVE-2019-11753",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-11753"
}
],
"notes": [
{
"category": "general",
"text": "The Firefox installer allows Firefox to be installed to a custom user writable location, leaving it unprotected from manipulation by unprivileged users or malware. If the Mozilla Maintenance Service is manipulated to update this unprotected location and the updated maintenance service in the unprotected location has been altered, the altered maintenance service can run with elevated privileges during the update process due to a lack of integrity checks. This allows for privilege escalation if the executable has been replaced locally. \u003cbr\u003e*Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Firefox \u003c 69, Firefox ESR \u003c 60.9, and Firefox ESR \u003c 68.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-11753",
"url": "https://www.suse.com/security/cve/CVE-2019-11753"
},
{
"category": "external",
"summary": "SUSE Bug 1149295 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149295"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-11753",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "moderate"
}
],
"title": "CVE-2019-11753"
},
{
"cve": "CVE-2019-9811",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9811"
}
],
"notes": [
{
"category": "general",
"text": "As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR \u003c 60.8, Firefox \u003c 68, and Thunderbird \u003c 60.8.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9811",
"url": "https://www.suse.com/security/cve/CVE-2019-9811"
},
{
"category": "external",
"summary": "SUSE Bug 1140868 for CVE-2019-9811",
"url": "https://bugzilla.suse.com/1140868"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-9811"
},
{
"cve": "CVE-2019-9812",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2019-9812"
}
],
"notes": [
{
"category": "general",
"text": "Given a compromised sandboxed content process due to a separate vulnerability, it is possible to escape that sandbox by loading accounts.firefox.com in that process and forcing a log-in to a malicious Firefox Sync account. Preference settings that disable the sandbox are then synchronized to the local machine and the compromised browser would restart without the sandbox if a crash is triggered. This vulnerability affects Firefox ESR \u003c 60.9, Firefox ESR \u003c 68.1, and Firefox \u003c 69.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2019-9812",
"url": "https://www.suse.com/security/cve/CVE-2019-9812"
},
{
"category": "external",
"summary": "SUSE Bug 1149294 for CVE-2019-9812",
"url": "https://bugzilla.suse.com/1149294"
},
{
"category": "external",
"summary": "SUSE Bug 1149323 for CVE-2019-9812",
"url": "https://bugzilla.suse.com/1149323"
},
{
"category": "external",
"summary": "SUSE Bug 1149324 for CVE-2019-9812",
"url": "https://bugzilla.suse.com/1149324"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.1:MozillaFirefox-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-branding-upstream-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-buildsymbols-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-devel-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-common-68.1.0-lp151.2.14.1.x86_64",
"openSUSE Leap 15.1:MozillaFirefox-translations-other-68.1.0-lp151.2.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2019-10-04T22:24:43Z",
"details": "important"
}
],
"title": "CVE-2019-9812"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.