vuln-list-alt/oval/p11/ALT-PU-2016-1836/definitions.json

595 lines
29 KiB
JSON
Raw Normal View History

2024-12-13 00:07:30 +03:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161836",
"Version": "oval:org.altlinux.errata:def:20161836",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1836: package `firefox` update to version 48.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1836",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1836",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-01470",
"RefURL": "https://bdu.fstec.ru/vul/2016-01470",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01909",
"RefURL": "https://bdu.fstec.ru/vul/2016-01909",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01911",
"RefURL": "https://bdu.fstec.ru/vul/2016-01911",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01912",
"RefURL": "https://bdu.fstec.ru/vul/2016-01912",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01913",
"RefURL": "https://bdu.fstec.ru/vul/2016-01913",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01914",
"RefURL": "https://bdu.fstec.ru/vul/2016-01914",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01915",
"RefURL": "https://bdu.fstec.ru/vul/2016-01915",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01916",
"RefURL": "https://bdu.fstec.ru/vul/2016-01916",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01917",
"RefURL": "https://bdu.fstec.ru/vul/2016-01917",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01918",
"RefURL": "https://bdu.fstec.ru/vul/2016-01918",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01919",
"RefURL": "https://bdu.fstec.ru/vul/2016-01919",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01920",
"RefURL": "https://bdu.fstec.ru/vul/2016-01920",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01921",
"RefURL": "https://bdu.fstec.ru/vul/2016-01921",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01922",
"RefURL": "https://bdu.fstec.ru/vul/2016-01922",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01923",
"RefURL": "https://bdu.fstec.ru/vul/2016-01923",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01924",
"RefURL": "https://bdu.fstec.ru/vul/2016-01924",
"Source": "BDU"
},
{
"RefID": "CVE-2016-0718",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2830",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2830",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2836",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2836",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2837",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2837",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2838",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2838",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5250",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5250",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5251",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5252",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5252",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5253",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5254",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5254",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5255",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5258",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5259",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5259",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5260",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5261",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5262",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5262",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5263",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5263",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5264",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5264",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5265",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5265",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5266",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266",
"Source": "CVE"
},
{
"RefID": "CVE-2016-5268",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 48.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01470: Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01909: Уязвимость браузера Firefox, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2016-01911: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к локальным файлам\n\n * BDU:2016-01912: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти существующую политику ограничения доступа или читать произвольные файлы\n\n * BDU:2016-01913: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01914: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01915: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01916: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01917: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01918: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01919: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01920: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01921: Уязвимость браузера Firefox, позволяющая нарушителю изменять произвольные файлы\n\n * BDU:2016-01922: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01923: Уязвимость браузера Firefox, позволяющая нарушителю подменить адресную строку\n\n * BDU:2016-01924: Уязвимость браузера Firefox, позволяющая нарушителю получить информацию о последних посещенных страницах\n\n * CVE-2016-0718: Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.\n\n * CVE-2016-2830: Mozilla Firefox before 48.0 and Firefox ESR 45.x before 45.3 preserve the network connection used for favicon resource retrieval after the associated browser window is closed, which makes it easier for remote web servers to track users by observing network traffic from multiple IP addresses.\n\n * CVE-2016-2835: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 48.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-08-11"
},
"Updated": {
"Date": "2016-08-11"
},
"BDUs": [
{
"ID": "BDU:2016-01470",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01470",
"Impact": "High",
"Public": "20160526"
},
{
"ID": "BDU:2016-01909",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2016-01909",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01911",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01911",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01912",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01912",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01913",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01913",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01914",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2016-01914",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01915",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2016-01915",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "BDU:2016-01916",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01916",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01917",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01917",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01918",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01918",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01919",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01919",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01920",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01920",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "BDU:2016-01921",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01921",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01922",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01922",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01923",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2016-01923",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "BDU:2016-01924",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2016-01924",
"Impact": "Low",
"Public": "20160805"
}
],
"CVEs": [
{
"ID": "CVE-2016-0718",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-0718",
"Impact": "Critical",
"Public": "20160526"
},
{
"ID": "CVE-2016-2830",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2830",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-2835",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2835",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-2836",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2836",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-2837",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2837",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-2838",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2838",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5250",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5250",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5251",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5251",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5252",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5252",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5253",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5253",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5254",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5254",
"Impact": "Critical",
"Public": "20160805"
},
{
"ID": "CVE-2016-5255",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5255",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5258",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5258",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5259",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5259",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5260",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5260",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5261",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5261",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5262",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5262",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5263",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5263",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5264",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5264",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5265",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:C/C:H/I:N/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5265",
"Impact": "Low",
"Public": "20160805"
},
{
"ID": "CVE-2016-5266",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5266",
"Impact": "High",
"Public": "20160805"
},
{
"ID": "CVE-2016-5268",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-254",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5268",
"Impact": "Low",
"Public": "20160805"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161836001",
"Comment": "firefox is earlier than 0:48.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161836002",
"Comment": "i586-firefox is earlier than 0:48.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161836003",
"Comment": "rpm-build-firefox is earlier than 0:48.0-alt1"
}
]
}
]
}
}
]
}