361 lines
17 KiB
JSON
361 lines
17 KiB
JSON
|
{
|
|||
|
"Definition": [
|
|||
|
{
|
|||
|
"ID": "oval:org.altlinux.errata:def:20161433",
|
|||
|
"Version": "oval:org.altlinux.errata:def:20161433",
|
|||
|
"Class": "patch",
|
|||
|
"Metadata": {
|
|||
|
"Title": "ALT-PU-2016-1433: package `firefox` update to version 46.0-alt1",
|
|||
|
"AffectedList": [
|
|||
|
{
|
|||
|
"Family": "unix",
|
|||
|
"Platforms": [
|
|||
|
"ALT Linux branch c9f2"
|
|||
|
],
|
|||
|
"Products": [
|
|||
|
"ALT SPWorkstation",
|
|||
|
"ALT SPServer"
|
|||
|
]
|
|||
|
}
|
|||
|
],
|
|||
|
"References": [
|
|||
|
{
|
|||
|
"RefID": "ALT-PU-2016-1433",
|
|||
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1433",
|
|||
|
"Source": "ALTPU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01138",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01138",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01147",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01147",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01148",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01148",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01149",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01149",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01150",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01150",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01152",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01152",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01153",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01153",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01156",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01156",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01157",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01157",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2016-01158",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01158",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2804",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2806",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2806",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2807",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2807",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2808",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2808",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2811",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2812",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2814",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2814",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2816",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2817",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-2820",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2016-9905",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9905",
|
|||
|
"Source": "CVE"
|
|||
|
}
|
|||
|
],
|
|||
|
"Description": "This update upgrades firefox to version 46.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01138: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01147: Уязвимость браузера Firefox, позволяющая нарушителю внести изменения в настройки общего доступа\n\n * BDU:2016-01148: Уязвимость браузера Firefox, позволяющая нарушителю проводить UXSS-атаки\n\n * BDU:2016-01149: Уязвимость браузера Firefox, позволяющая нарушителю обойти защитный механизм CSP\n\n * BDU:2016-01150: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01152: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01153: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01156: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01157: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01158: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2016-2804: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2806: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2807: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2808: The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.\n\n * CVE-2016-2811: Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.\n\n * CVE-2016-2812: Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.\n\n * CVE-2016-2814: Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.
|
|||
|
"Advisory": {
|
|||
|
"From": "errata.altlinux.org",
|
|||
|
"Severity": "Critical",
|
|||
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|||
|
"Issued": {
|
|||
|
"Date": "2016-05-01"
|
|||
|
},
|
|||
|
"Updated": {
|
|||
|
"Date": "2016-05-01"
|
|||
|
},
|
|||
|
"BDUs": [
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01138",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01138",
|
|||
|
"Impact": "Critical",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01147",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CWE": "CWE-284",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01147",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01148",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CWE": "CWE-264",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01148",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01149",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CWE": "CWE-284",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01149",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01150",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01150",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01152",
|
|||
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|||
|
"CWE": "CWE-362",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01152",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01153",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01153",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01156",
|
|||
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01156",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01157",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01157",
|
|||
|
"Impact": "Critical",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2016-01158",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2016-01158",
|
|||
|
"Impact": "Critical",
|
|||
|
"Public": "20160430"
|
|||
|
}
|
|||
|
],
|
|||
|
"CVEs": [
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2804",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2806",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2806",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2807",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2807",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2808",
|
|||
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2808",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2811",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "NVD-CWE-Other",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2812",
|
|||
|
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-362",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2814",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2814",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2816",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|||
|
"CWE": "CWE-284",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2817",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
|
|||
|
"CWE": "CWE-264",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-2820",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|||
|
"CWE": "CWE-284",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20160430"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2016-9905",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-284",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9905",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20180611"
|
|||
|
}
|
|||
|
],
|
|||
|
"AffectedCPEs": {
|
|||
|
"CPEs": [
|
|||
|
"cpe:/o:alt:spworkstation:8.4",
|
|||
|
"cpe:/o:alt:spserver:8.4"
|
|||
|
]
|
|||
|
}
|
|||
|
}
|
|||
|
},
|
|||
|
"Criteria": {
|
|||
|
"Operator": "AND",
|
|||
|
"Criterions": [
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|||
|
"Comment": "ALT Linux must be installed"
|
|||
|
}
|
|||
|
],
|
|||
|
"Criterias": [
|
|||
|
{
|
|||
|
"Operator": "OR",
|
|||
|
"Criterions": [
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20161433001",
|
|||
|
"Comment": "firefox is earlier than 0:46.0-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20161433002",
|
|||
|
"Comment": "rpm-build-firefox is earlier than 0:46.0-alt1"
|
|||
|
}
|
|||
|
]
|
|||
|
}
|
|||
|
]
|
|||
|
}
|
|||
|
}
|
|||
|
]
|
|||
|
}
|