2024-06-28 13:17:52 +00:00

266 lines
13 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202127",
"Version": "oval:org.altlinux.errata:def:20202127",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2127: package `firefox` update to version 77.0.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2127",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2127",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-00078",
"RefURL": "https://bdu.fstec.ru/vul/2021-00078",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00094",
"RefURL": "https://bdu.fstec.ru/vul/2021-00094",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00095",
"RefURL": "https://bdu.fstec.ru/vul/2021-00095",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00099",
"RefURL": "https://bdu.fstec.ru/vul/2021-00099",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02028",
"RefURL": "https://bdu.fstec.ru/vul/2021-02028",
"Source": "BDU"
},
{
"RefID": "CVE-2020-12399",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12399",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12405",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12405",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12406",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12406",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12407",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12408",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12409",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12409",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12410",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12411",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12411",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 77.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2021-00078: Уязвимость веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-00094: Уязвимость модуля распаковки веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с недостатком механизма проверки подлинности данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-00095: Уязвимость браузера Firefox, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-00099: Уязвимость подписи DSA веб-браузеров программного обеспечения Firefox, Firefox-esr и Thunderbird, связанная с раскрытием информации в результате расхождений, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-02028: Уязвимость компонента SharedWorkerService браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2020-12399: NSS has shown timing differences when performing DSA signatures, which was exploitable and could eventually leak private keys. This vulnerability affects Thunderbird \u003c 68.9.0, Firefox \u003c 77, and Firefox ESR \u003c 68.9.\n\n * CVE-2020-12405: When browsing a malicious page, a race condition in our SharedWorkerService could occur and lead to a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 68.9.0, Firefox \u003c 77, and Firefox ESR \u003c 68.9.\n\n * CVE-2020-12406: Mozilla Developer Iain Ireland discovered a missing type check during unboxed objects removal, resulting in a crash. We presume that with enough effort that it could be exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.9.0, Firefox \u003c 77, and Firefox ESR \u003c 68.9.\n\n * CVE-2020-12407: Mozilla Developer Nicolas Silva found that when using WebRender, Firefox would under certain conditions leak arbitrary GPU memory to the visible screen. The leaked memory content was visible to the user, but not observable from web content. This vulnerability affects Firefox \u003c 77.\n\n * CVE-2020-12408: When browsing a document hosted on an IP address, an attacker could insert certain characters to flip domain and path information in the address bar. This vulnerability affects Firefox \u003c 77.\n\n * CVE-2020-12409: When using certain blank characters in a URL, they where incorrectly rendered as spaces instead of an encoded URL. This vulnerability affects Firefox \u003c 77.\n\n * CVE-2020-12410: Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 68.9.0, Firefox \u003c 77, and Firefox ESR \u003c 68.9.\n\n * CVE-2020-12411: Mozilla developers reported memory safety bugs present in Firefox 76. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 77.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-06-06"
},
"Updated": {
"Date": "2020-06-06"
},
"BDUs": [
{
"ID": "BDU:2021-00078",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00078",
"Impact": "High",
"Public": "20200709"
},
{
"ID": "BDU:2021-00094",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-345",
"Href": "https://bdu.fstec.ru/vul/2021-00094",
"Impact": "High",
"Public": "20200709"
},
{
"ID": "BDU:2021-00095",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-00095",
"Impact": "Critical",
"Public": "20200709"
},
{
"ID": "BDU:2021-00099",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://bdu.fstec.ru/vul/2021-00099",
"Impact": "Low",
"Public": "20200602"
},
{
"ID": "BDU:2021-02028",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-02028",
"Impact": "Low",
"Public": "20200709"
}
],
"CVEs": [
{
"ID": "CVE-2020-12399",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12399",
"Impact": "Low",
"Public": "20200709"
},
{
"ID": "CVE-2020-12405",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12405",
"Impact": "Low",
"Public": "20200709"
},
{
"ID": "CVE-2020-12406",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-345",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12406",
"Impact": "High",
"Public": "20200709"
},
{
"ID": "CVE-2020-12407",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12407",
"Impact": "Low",
"Public": "20200709"
},
{
"ID": "CVE-2020-12408",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12408",
"Impact": "Low",
"Public": "20200709"
},
{
"ID": "CVE-2020-12409",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12409",
"Impact": "High",
"Public": "20200709"
},
{
"ID": "CVE-2020-12410",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12410",
"Impact": "High",
"Public": "20200709"
},
{
"ID": "CVE-2020-12411",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12411",
"Impact": "High",
"Public": "20200709"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202127001",
"Comment": "firefox is earlier than 0:77.0.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202127002",
"Comment": "firefox-config-privacy is earlier than 0:77.0.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202127003",
"Comment": "firefox-wayland is earlier than 0:77.0.1-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202127004",
"Comment": "rpm-build-firefox is earlier than 0:77.0.1-alt1"
}
]
}
]
}
}
]
}