vuln-list-alt/oval/c10f1/ALT-PU-2018-2417/definitions.json
2024-06-28 13:17:52 +00:00

129 lines
5.1 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182417",
"Version": "oval:org.altlinux.errata:def:20182417",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2417: package `firefox-esr` update to version 60.2.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2417",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2417",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03414",
"RefURL": "https://bdu.fstec.ru/vul/2019-03414",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03415",
"RefURL": "https://bdu.fstec.ru/vul/2019-03415",
"Source": "BDU"
},
{
"RefID": "CVE-2018-12386",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12386",
"Source": "CVE"
},
{
"RefID": "CVE-2018-12387",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-12387",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox-esr to version 60.2.2-alt1. \nSecurity Fix(es):\n\n * BDU:2019-03414: Уязвимость веб-браузеров Firefox, Firefox ESR, связанная с ошибками преобразования типов данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-03415: Уязвимость реализации метода Array.prototype.push JIT-компилятора веб-браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2018-12386: A vulnerability in register allocation in JavaScript can lead to type confusion, allowing for an arbitrary read and write. This leads to remote code execution inside the sandboxed content process when triggered. This vulnerability affects Firefox ESR \u003c 60.2.2 and Firefox \u003c 62.0.3.\n\n * CVE-2018-12387: A vulnerability where the JavaScript JIT compiler inlines Array.prototype.push with multiple arguments that results in the stack pointer being off by 8 bytes after a bailout. This leaks a memory address to the calling function which can be used as part of an exploit inside the sandboxed content process. This vulnerability affects Firefox ESR \u003c 60.2.2 and Firefox \u003c 62.0.3.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-10-03"
},
"Updated": {
"Date": "2018-10-03"
},
"BDUs": [
{
"ID": "BDU:2019-03414",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-03414",
"Impact": "High",
"Public": "20181002"
},
{
"ID": "BDU:2019-03415",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03415",
"Impact": "Critical",
"Public": "20181002"
}
],
"CVEs": [
{
"ID": "CVE-2018-12386",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12386",
"Impact": "High",
"Public": "20181018"
},
{
"ID": "CVE-2018-12387",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-12387",
"Impact": "Critical",
"Public": "20181018"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182417001",
"Comment": "firefox-esr is earlier than 0:60.2.2-alt1"
}
]
}
]
}
}
]
}