UBUNTU-CVE-2019-9793

Source
https://ubuntu.com/security/CVE-2019-9793
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-9793
Upstream
Downstream
Related
Published
2019-03-20T00:00:00Z
Modified
2026-01-30T00:36:58.097621Z
Severity
  • 5.9 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A mechanism was discovered that removes some bounds checking for string, array, or typed array accesses if Spectre mitigations have been disabled. This vulnerability could allow an attacker to create an arbitrary value in compiled JavaScript, for which the range analysis will infer a fully controlled, incorrect range in circumstances where users have explicitly disabled Spectre mitigations. Note: Spectre mitigations are currently enabled for all users by default settings.. This vulnerability affects Thunderbird < 60.6, Firefox ESR < 60.6, and Firefox < 66.

References

Affected packages

Ubuntu:14.04:LTS
firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@66.0.1+build1-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
66.0.1+build1-0ubuntu0.14.04.1

Affected versions

24.*
24.0+build1-0ubuntu1
25.*
25.0+build3-0ubuntu0.13.10.1
28.*
28.0~b2+build1-0ubuntu2
28.0+build1-0ubuntu1
28.0+build2-0ubuntu1
28.0+build2-0ubuntu2
29.*
29.0+build1-0ubuntu0.14.04.2
30.*
30.0+build1-0ubuntu0.14.04.3
31.*
31.0+build1-0ubuntu0.14.04.1
32.*
32.0+build1-0ubuntu0.14.04.1
32.0.3+build1-0ubuntu0.14.04.1
33.*
33.0+build2-0ubuntu0.14.04.1
34.*
34.0+build2-0ubuntu0.14.04.1
35.*
35.0+build3-0ubuntu0.14.04.2
35.0.1+build1-0ubuntu0.14.04.1
36.*
36.0+build2-0ubuntu0.14.04.4
36.0.1+build2-0ubuntu0.14.04.1
36.0.4+build1-0ubuntu0.14.04.1
37.*
37.0+build2-0ubuntu0.14.04.1
37.0.1+build1-0ubuntu0.14.04.1
37.0.2+build1-0ubuntu0.14.04.1
38.*
38.0+build3-0ubuntu0.14.04.1
39.*
39.0+build5-0ubuntu0.14.04.1
39.0.3+build2-0ubuntu0.14.04.1
40.*
40.0+build4-0ubuntu0.14.04.1
40.0+build4-0ubuntu0.14.04.4
40.0.3+build1-0ubuntu0.14.04.1
41.*
41.0+build3-0ubuntu0.14.04.1
41.0.1+build2-0ubuntu0.14.04.1
41.0.2+build2-0ubuntu0.14.04.1
42.*
42.0+build2-0ubuntu0.14.04.1
43.*
43.0+build1-0ubuntu0.14.04.1
43.0.4+build3-0ubuntu0.14.04.1
44.*
44.0+build3-0ubuntu0.14.04.1
44.0.1+build2-0ubuntu0.14.04.1
44.0.2+build1-0ubuntu0.14.04.1
45.*
45.0+build2-0ubuntu0.14.04.1
45.0.1+build1-0ubuntu0.14.04.2
45.0.2+build1-0ubuntu0.14.04.1
46.*
46.0+build5-0ubuntu0.14.04.2
46.0.1+build1-0ubuntu0.14.04.3
47.*
47.0+build3-0ubuntu0.14.04.1
48.*
48.0+build2-0ubuntu0.14.04.1
49.*
49.0+build4-0ubuntu0.14.04.1
49.0.2+build2-0ubuntu0.14.04.1
50.*
50.0+build2-0ubuntu0.14.04.2
50.0.2+build1-0ubuntu0.14.04.1
50.1.0+build2-0ubuntu0.14.04.1
51.*
51.0.1+build2-0ubuntu0.14.04.1
51.0.1+build2-0ubuntu0.14.04.2
52.*
52.0+build2-0ubuntu0.14.04.1
52.0.1+build2-0ubuntu0.14.04.1
52.0.2+build1-0ubuntu0.14.04.1
53.*
53.0+build6-0ubuntu0.14.04.1
53.0.2+build1-0ubuntu0.14.04.2
53.0.3+build1-0ubuntu0.14.04.2
54.*
54.0+build3-0ubuntu0.14.04.1
55.*
55.0.1+build2-0ubuntu0.14.04.2
55.0.2+build1-0ubuntu0.14.04.1
56.*
56.0+build6-0ubuntu0.14.04.1
56.0+build6-0ubuntu0.14.04.2
57.*
57.0+build4-0ubuntu0.14.04.4
57.0+build4-0ubuntu0.14.04.5
57.0.1+build2-0ubuntu0.14.04.1
57.0.3+build1-0ubuntu0.14.04.1
57.0.4+build1-0ubuntu0.14.04.1
58.*
58.0+build6-0ubuntu0.14.04.1
58.0.1+build1-0ubuntu0.14.04.1
58.0.2+build1-0ubuntu0.14.04.1
59.*
59.0+build5-0ubuntu0.14.04.1
59.0.1+build1-0ubuntu0.14.04.1
59.0.2+build1-0ubuntu0.14.04.1
59.0.2+build1-0ubuntu0.14.04.4
60.*
60.0+build2-0ubuntu0.14.04.1
60.0.1+build2-0ubuntu0.14.04.1
60.0.2+build1-0ubuntu0.14.04.1
61.*
61.0+build3-0ubuntu0.14.04.2
61.0.1+build1-0ubuntu0.14.04.1
62.*
62.0+build2-0ubuntu0.14.04.3
62.0+build2-0ubuntu0.14.04.4
62.0+build2-0ubuntu0.14.04.5
62.0.3+build1-0ubuntu0.14.04.2
63.*
63.0+build2-0ubuntu0.14.04.2
63.0.3+build1-0ubuntu0.14.04.1
64.*
64.0+build3-0ubuntu0.14.04.1
65.*
65.0+build2-0ubuntu0.14.04.1
65.0.1+build2-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "66.0.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "66.0.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "66.0.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "66.0.1+build1-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "66.0.1+build1-0ubuntu0.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:60.6.1+build2-0ubuntu0.14.04.1?arch=source&distro=trusty

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:60.6.1+build2-0ubuntu0.14.04.1

Affected versions

1:24.*
1:24.0+build1-0ubuntu1
1:24.0+build1-0ubuntu2
1:24.1.1+build1-0ubuntu0.13.10.1
1:24.1.1+build1-0ubuntu1
1:24.2.0+build1-0ubuntu1
1:24.4.0+build1-0ubuntu1
1:24.5.0+build1-0ubuntu0.14.04.1
1:24.6.0+build1-0ubuntu0.14.04.1
1:31.*
1:31.0+build1-0ubuntu0.14.04.1
1:31.1.1+build1-0ubuntu0.14.04.1
1:31.1.2+build1-0ubuntu0.14.04.1
1:31.2.0+build2-0ubuntu0.14.04.1
1:31.3.0+build1-0ubuntu0.14.04.1
1:31.4.0+build1-0ubuntu0.14.04.1
1:31.5.0+build1-0ubuntu0.14.04.1
1:31.6.0+build1-0ubuntu0.14.04.1
1:31.7.0+build1-0ubuntu0.14.04.1
1:31.8.0+build1-0ubuntu0.14.04.1
1:38.*
1:38.2.0+build1-0ubuntu0.14.04.1
1:38.3.0+build1-0ubuntu0.14.04.1
1:38.4.0+build3-0ubuntu0.14.04.1
1:38.5.1+build2-0ubuntu0.14.04.1
1:38.6.0+build1-0ubuntu0.14.04.1
1:38.7.2+build1-0ubuntu0.14.04.1
1:38.8.0+build1-0ubuntu0.14.04.1
1:45.*
1:45.2.0+build1-0ubuntu0.14.04.3
1:45.3.0+build1-0ubuntu0.14.04.4
1:45.4.0+build1-0ubuntu0.14.04.1
1:45.5.1+build1-0ubuntu0.14.04.1
1:45.7.0+build1-0ubuntu0.14.04.1
1:45.8.0+build1-0ubuntu0.14.04.1
1:52.*
1:52.1.1+build1-0ubuntu0.14.04.1
1:52.2.1+build1-0ubuntu0.14.04.1
1:52.3.0+build1-0ubuntu0.14.04.1
1:52.4.0+build1-0ubuntu0.14.04.2
1:52.5.0+build1-0ubuntu0.14.04.1
1:52.6.0+build1-0ubuntu0.14.04.1
1:52.7.0+build1-0ubuntu0.14.04.1
1:52.8.0+build1-0ubuntu0.14.04.1
1:52.9.1+build3-0ubuntu0.14.04.1
1:60.*
1:60.2.1+build1-0ubuntu0.14.04.2
1:60.4.0+build2-0ubuntu0.14.04.1
1:60.5.1+build2-0ubuntu0.14.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:60.6.1+build2-0ubuntu0.14.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
Ubuntu:16.04:LTS
firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@66.0+build3-0ubuntu0.16.04.2?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
66.0+build3-0ubuntu0.16.04.2

Affected versions

41.*
41.0.2+build2-0ubuntu1
42.*
42.0+build2-0ubuntu1
44.*
44.0+build3-0ubuntu2
44.0.1+build1-0ubuntu1
44.0.2+build1-0ubuntu1
45.*
45.0+build2-0ubuntu1
45.0.1+build1-0ubuntu1
45.0.2+build1-0ubuntu1
46.*
46.0+build5-0ubuntu0.16.04.2
46.0.1+build1-0ubuntu0.16.04.2
47.*
47.0+build3-0ubuntu0.16.04.1
48.*
48.0+build2-0ubuntu0.16.04.1
49.*
49.0+build4-0ubuntu0.16.04.1
49.0.2+build2-0ubuntu0.16.04.2
50.*
50.0+build2-0ubuntu0.16.04.2
50.0.2+build1-0ubuntu0.16.04.1
50.1.0+build2-0ubuntu0.16.04.1
51.*
51.0.1+build2-0ubuntu0.16.04.1
51.0.1+build2-0ubuntu0.16.04.2
52.*
52.0+build2-0ubuntu0.16.04.1
52.0.1+build2-0ubuntu0.16.04.1
52.0.2+build1-0ubuntu0.16.04.1
53.*
53.0+build6-0ubuntu0.16.04.1
53.0.2+build1-0ubuntu0.16.04.2
53.0.3+build1-0ubuntu0.16.04.2
54.*
54.0+build3-0ubuntu0.16.04.1
55.*
55.0.1+build2-0ubuntu0.16.04.2
55.0.2+build1-0ubuntu0.16.04.1
56.*
56.0+build6-0ubuntu0.16.04.1
56.0+build6-0ubuntu0.16.04.2
57.*
57.0+build4-0ubuntu0.16.04.5
57.0+build4-0ubuntu0.16.04.6
57.0.1+build2-0ubuntu0.16.04.1
57.0.3+build1-0ubuntu0.16.04.1
57.0.4+build1-0ubuntu0.16.04.1
58.*
58.0+build6-0ubuntu0.16.04.1
58.0.1+build1-0ubuntu0.16.04.1
58.0.2+build1-0ubuntu0.16.04.1
59.*
59.0+build5-0ubuntu0.16.04.1
59.0.1+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.1
59.0.2+build1-0ubuntu0.16.04.3
60.*
60.0+build2-0ubuntu0.16.04.1
60.0.1+build2-0ubuntu0.16.04.1
60.0.2+build1-0ubuntu0.16.04.1
61.*
61.0+build3-0ubuntu0.16.04.2
61.0.1+build1-0ubuntu0.16.04.1
62.*
62.0+build2-0ubuntu0.16.04.3
62.0+build2-0ubuntu0.16.04.4
62.0+build2-0ubuntu0.16.04.5
62.0.3+build1-0ubuntu0.16.04.2
63.*
63.0+build2-0ubuntu0.16.04.2
63.0.3+build1-0ubuntu0.16.04.1
64.*
64.0+build3-0ubuntu0.16.04.1
65.*
65.0+build2-0ubuntu0.16.04.1
65.0.1+build2-0ubuntu0.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "66.0+build3-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "66.0+build3-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "66.0+build3-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "66.0+build3-0ubuntu0.16.04.2"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "66.0+build3-0ubuntu0.16.04.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:60.6.1+build2-0ubuntu0.16.04.1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:60.6.1+build2-0ubuntu0.16.04.1

Affected versions

1:38.*
1:38.3.0+build1-0ubuntu2
1:38.5.1+build2-0ubuntu1
1:38.6.0+build1-0ubuntu1
1:38.7.2+build1-0ubuntu0.16.04.1
1:38.8.0+build1-0ubuntu0.16.04.1
1:45.*
1:45.2.0+build1-0ubuntu0.16.04.1
1:45.3.0+build1-0ubuntu0.16.04.2
1:45.4.0+build1-0ubuntu0.16.04.1
1:45.5.1+build1-0ubuntu0.16.04.1
1:45.7.0+build1-0ubuntu0.16.04.1
1:45.8.0+build1-0ubuntu0.16.04.1
1:52.*
1:52.1.1+build1-0ubuntu0.16.04.1
1:52.2.1+build1-0ubuntu0.16.04.1
1:52.3.0+build1-0ubuntu0.16.04.1
1:52.4.0+build1-0ubuntu0.16.04.2
1:52.5.0+build1-0ubuntu0.16.04.1
1:52.6.0+build1-0ubuntu0.16.04.1
1:52.7.0+build1-0ubuntu0.16.04.1
1:52.8.0+build1-0ubuntu0.16.04.1
1:52.9.1+build3-0ubuntu0.16.04.1
1:60.*
1:60.2.1+build1-0ubuntu0.16.04.4
1:60.4.0+build2-0ubuntu0.16.04.1
1:60.5.1+build2-0ubuntu0.16.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:60.6.1+build2-0ubuntu0.16.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
Ubuntu:18.04:LTS
firefox

Package

Name
firefox
Purl
pkg:deb/ubuntu/firefox@66.0+build3-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
66.0+build3-0ubuntu0.18.04.1

Affected versions

56.*
56.0+build6-0ubuntu1
57.*
57.0.1+build2-0ubuntu1
59.*
59.0.1+build1-0ubuntu1
59.0.2+build1-0ubuntu1
60.*
60.0+build2-0ubuntu1
60.0.1+build2-0ubuntu0.18.04.1
60.0.2+build1-0ubuntu0.18.04.1
61.*
61.0+build3-0ubuntu0.18.04.1
61.0.1+build1-0ubuntu0.18.04.1
62.*
62.0+build2-0ubuntu0.18.04.3
62.0+build2-0ubuntu0.18.04.4
62.0+build2-0ubuntu0.18.04.5
62.0.3+build1-0ubuntu0.18.04.1
63.*
63.0+build2-0ubuntu0.18.04.2
63.0.3+build1-0ubuntu0.18.04.1
64.*
64.0+build3-0ubuntu0.18.04.1
65.*
65.0+build2-0ubuntu0.18.04.1
65.0.1+build2-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "firefox",
            "binary_version": "66.0+build3-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-dev",
            "binary_version": "66.0+build3-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-globalmenu",
            "binary_version": "66.0+build3-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-mozsymbols",
            "binary_version": "66.0+build3-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "firefox-testsuite",
            "binary_version": "66.0+build3-0ubuntu0.18.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
thunderbird

Package

Name
thunderbird
Purl
pkg:deb/ubuntu/thunderbird@1:60.6.1+build2-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1:60.6.1+build2-0ubuntu0.18.04.1

Affected versions

1:52.*
1:52.4.0+build1-0ubuntu2
1:52.6.0+build1-0ubuntu1
1:52.7.0+build1-0ubuntu1
1:52.8.0+build1-0ubuntu0.18.04.1
1:52.9.1+build3-0ubuntu0.18.04.1
1:60.*
1:60.2.1+build1-0ubuntu0.18.04.2
1:60.4.0+build2-0ubuntu0.18.04.1
1:60.5.1+build2-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "thunderbird",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "thunderbird-dev",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "thunderbird-globalmenu",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "thunderbird-gnome-support",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "thunderbird-mozsymbols",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "xul-ext-calendar-timezones",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "xul-ext-gdata-provider",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "xul-ext-lightning",
            "binary_version": "1:60.6.1+build2-0ubuntu0.18.04.1"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
mozjs52

Package

Name
mozjs52
Purl
pkg:deb/ubuntu/mozjs52@52.9.1-0ubuntu0.18.04.1?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

52.*
52.3.1-0ubuntu3
52.3.1-7fakesync1
52.8.1-0ubuntu0.18.04.1
52.9.1-0ubuntu0.18.04.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libmozjs-52-0",
            "binary_version": "52.9.1-0ubuntu0.18.04.1"
        },
        {
            "binary_name": "libmozjs-52-dev",
            "binary_version": "52.9.1-0ubuntu0.18.04.1"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
mozjs38

Package

Name
mozjs38
Purl
pkg:deb/ubuntu/mozjs38@38.8.0~repack1-0ubuntu4?arch=source&distro=bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

38.*
38.8.0~repack1-0ubuntu1
38.8.0~repack1-0ubuntu3
38.8.0~repack1-0ubuntu4

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libmozjs-38-0",
            "binary_version": "38.8.0~repack1-0ubuntu4"
        },
        {
            "binary_name": "libmozjs-38-dev",
            "binary_version": "38.8.0~repack1-0ubuntu4"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"
Ubuntu:20.04:LTS
mozjs52

Package

Name
mozjs52
Purl
pkg:deb/ubuntu/mozjs52@52.9.1-1ubuntu3?arch=source&distro=focal

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

52.*
52.9.1-1build1
52.9.1-1ubuntu3

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libmozjs-52-0",
            "binary_version": "52.9.1-1ubuntu3"
        },
        {
            "binary_name": "libmozjs-52-dev",
            "binary_version": "52.9.1-1ubuntu3"
        }
    ]
}

Database specific

source
"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9793.json"