307 lines
14 KiB
JSON
Raw Normal View History

2024-06-28 13:17:52 +00:00
{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161057",
"Version": "oval:org.altlinux.errata:def:20161057",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1057: package `firefox` update to version 44.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1057",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1057",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00509",
"RefURL": "https://bdu.fstec.ru/vul/2016-00509",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00510",
"RefURL": "https://bdu.fstec.ru/vul/2016-00510",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00511",
"RefURL": "https://bdu.fstec.ru/vul/2016-00511",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00512",
"RefURL": "https://bdu.fstec.ru/vul/2016-00512",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00029",
"RefURL": "https://bdu.fstec.ru/vul/2018-00029",
"Source": "BDU"
},
{
"RefID": "CVE-2016-1930",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1930",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1931",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1931",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1933",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1933",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1935",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1935",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1937",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1937",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1939",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1939",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1942",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1942",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1944",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1944",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1945",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1945",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1946",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1946",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1947",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1947",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 44.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00509: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00510: Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00511: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00512: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2018-00029: Уязвимость функции BufferSubData() почтового клиента Thunderbird и браузеров Firefox позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2016-1930: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-1931: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.\n\n * CVE-2016-1933: Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.\n\n * CVE-2016-1935: Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.\n\n * CVE-2016-1937: The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.\n\n * CVE-2016-1939: Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.\n\n * CVE-2016-1942: Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.\n\n * CVE-2016-1944: The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1945: The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.\n\n * CVE-2016-1946: The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.\n\n * CVE-2016-1947: Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputati
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-01-28"
},
"Updated": {
"Date": "2016-01-28"
},
"BDUs": [
{
"ID": "BDU:2016-00509",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00509",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00510",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00510",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00511",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00511",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00512",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2016-00512",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2018-00029",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00029",
"Impact": "High",
"Public": "20160126"
}
],
"CVEs": [
{
"ID": "CVE-2016-1930",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1930",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1931",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1931",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1933",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1933",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1935",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1935",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1937",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1937",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1939",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1939",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1942",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1942",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1944",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1944",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1945",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1945",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1946",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1946",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1947",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"CWE": "CWE-19",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1947",
"Impact": "Low",
"Public": "20160131"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
2024-12-12 21:07:30 +00:00
"cpe:/o:alt:starterkit:p9"
2024-06-28 13:17:52 +00:00
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161057001",
"Comment": "firefox is earlier than 0:44.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161057002",
"Comment": "rpm-build-firefox is earlier than 0:44.0-alt1"
}
]
}
]
}
}
]
}