{"id":"openSUSE-SU-2019:2249-1","summary":"Security update for MozillaThunderbird","details":"This update for MozillaThunderbird to version 68.1.1 fixes the following issues:\n  \n- CVE-2019-11709: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11710: Fixed several memory safety bugs. (bsc#1140868)\n- CVE-2019-11711: Fixed a script injection within domain through inner window reuse. (bsc#1140868)\n- CVE-2019-11712: Fixed an insufficient validation of cross-origin POST requests within NPAPI plugins. (bsc#1140868)\n- CVE-2019-11713: Fixed a use-after-free with HTTP/2 cached stream. (bsc#1140868)\n- CVE-2019-11714: Fixed a crash in NeckoChild. (bsc#1140868)\n- CVE-2019-11715: Fixed an HTML parsing error that can contribute to content XSS. (bsc#1140868)\n- CVE-2019-11716: Fixed an enumeration issue in globalThis. (bsc#1140868)\n- CVE-2019-11717: Fixed an improper escaping of the caret character in origins. (bsc#1140868)\n- CVE-2019-11719: Fixed an out-of-bounds read when importing curve25519 private key. (bsc#1140868)\n- CVE-2019-11720: Fixed a character encoding XSS vulnerability. (bsc#1140868)\n- CVE-2019-11721: Fixed domain spoofing through unicode latin 'kra' character. (bsc#1140868)\n- CVE-2019-11723: Fixed a cookie leakage during add-on fetching across private browsing boundaries. (bsc#1140868)\n- CVE-2019-11724: Fixed a permissions issue with the retired site input.mozilla.org. (bsc#1140868)\n- CVE-2019-11725: Fixed a SafeBrowsing bypass through WebSockets. (bsc#1140868)\n- CVE-2019-11727: Fixed an insufficient validation for PKCS#1 v1.5 signatures being used with TLS 1.3. (bsc#1140868)\n- CVE-2019-11728: Fixed port scanning through Alt-Svc header. (bsc#1140868)\n- CVE-2019-11729: Fixed a segmentation fault due to empty or malformed p256-ECDH public keys. (bsc#1140868)\n- CVE-2019-11730: Fixed an insufficient enforcement of the same-origin policy that treats all files in a directory as having the same-origin. (bsc#1140868)\n- CVE-2019-11739: Fixed a Covert Content Attack on S/MIME encryption using a crafted multipart/alternative message. (bsc#1150939)\n- CVE-2019-11740: Fixed several memory safety bugs. (bsc#1149299)\n- CVE-2019-11742: Fixed a same-origin policy violation with SVG filters and canvas that enabled theft of cross-origin images. (bsc#1149303)\n- CVE-2019-11743: Fixed a cross-origin access issue. (bsc#1149298)\n- CVE-2019-11744: Fixed a XSS involving breaking out of title and textarea elements using innerHTML. (bsc#1149304)\n- CVE-2019-11746: Fixed a use-after-free while manipulating video. (bsc#1149297)\n- CVE-2019-11752: Fixed a use-after-free while extracting a key value in IndexedDB. (bsc#1149296)\n- CVE-2019-11755: Fixed an insufficient validation of S/MIME messages that allowed the author to be spoofed. (bsc#1152375)\n\nThis update was imported from the SUSE:SLE-15:Update update project.","modified":"2026-02-04T04:40:12.011418Z","published":"2019-10-04T10:24:16Z","related":["CVE-2019-11709","CVE-2019-11710","CVE-2019-11711","CVE-2019-11712","CVE-2019-11713","CVE-2019-11714","CVE-2019-11715","CVE-2019-11716","CVE-2019-11717","CVE-2019-11719","CVE-2019-11720","CVE-2019-11721","CVE-2019-11723","CVE-2019-11724","CVE-2019-11725","CVE-2019-11727","CVE-2019-11728","CVE-2019-11729","CVE-2019-11730","CVE-2019-11739","CVE-2019-11740","CVE-2019-11742","CVE-2019-11743","CVE-2019-11744","CVE-2019-11746","CVE-2019-11752","CVE-2019-11755"],"upstream":["CVE-2019-11709","CVE-2019-11710","CVE-2019-11711","CVE-2019-11712","CVE-2019-11713","CVE-2019-11714","CVE-2019-11715","CVE-2019-11716","CVE-2019-11717","CVE-2019-11719","CVE-2019-11720","CVE-2019-11721","CVE-2019-11723","CVE-2019-11724","CVE-2019-11725","CVE-2019-11727","CVE-2019-11728","CVE-2019-11729","CVE-2019-11730","CVE-2019-11739","CVE-2019-11740","CVE-2019-11742","CVE-2019-11743","CVE-2019-11744","CVE-2019-11746","CVE-2019-11752","CVE-2019-11755"],"references":[{"type":"ADVISORY","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/MZU237GIBE77LH7VPAJS5W64IMRQ7NSM/#MZU237GIBE77LH7VPAJS5W64IMRQ7NSM"},{"type":"REPORT","url":"https://bugzilla.suse.com/1140868"},{"type":"REPORT","url":"https://bugzilla.suse.com/1141322"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149296"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149297"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149298"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149299"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149303"},{"type":"REPORT","url":"https://bugzilla.suse.com/1149304"},{"type":"REPORT","url":"https://bugzilla.suse.com/1150939"},{"type":"REPORT","url":"https://bugzilla.suse.com/1152375"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11709"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11710"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11711"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11712"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11713"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11714"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11715"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11716"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11717"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11719"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11720"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11721"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11723"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11724"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11725"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11727"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11728"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11729"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11730"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11739"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11740"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11742"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11743"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11744"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11746"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11752"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2019-11755"}],"affected":[{"package":{"name":"MozillaThunderbird","ecosystem":"openSUSE:Leap 15.1","purl":"pkg:rpm/opensuse/MozillaThunderbird&distro=openSUSE%20Leap%2015.1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"68.1.1-lp151.2.13.1"}]}],"ecosystem_specific":{"binaries":[{"MozillaThunderbird-translations-other":"68.1.1-lp151.2.13.1","MozillaThunderbird-buildsymbols":"68.1.1-lp151.2.13.1","MozillaThunderbird":"68.1.1-lp151.2.13.1","enigmail":"2.1.2-lp151.2.6.1","MozillaThunderbird-translations-common":"68.1.1-lp151.2.13.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:2249-1.json"}},{"package":{"name":"enigmail","ecosystem":"openSUSE:Leap 15.1","purl":"pkg:rpm/opensuse/enigmail&distro=openSUSE%20Leap%2015.1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.1.2-lp151.2.6.1"}]}],"ecosystem_specific":{"binaries":[{"MozillaThunderbird-translations-other":"68.1.1-lp151.2.13.1","MozillaThunderbird-buildsymbols":"68.1.1-lp151.2.13.1","MozillaThunderbird":"68.1.1-lp151.2.13.1","enigmail":"2.1.2-lp151.2.6.1","MozillaThunderbird-translations-common":"68.1.1-lp151.2.13.1"}]},"database_specific":{"source":"https://ftp.suse.com/pub/projects/security/osv/openSUSE-SU-2019:2249-1.json"}}],"schema_version":"1.7.3"}