vuln-list-alt/oval/c10f1/ALT-PU-2021-2849/definitions.json
2024-06-28 13:17:52 +00:00

584 lines
31 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212849",
"Version": "oval:org.altlinux.errata:def:20212849",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2849: package `firefox` update to version 92.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2849",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2849",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-04068",
"RefURL": "https://bdu.fstec.ru/vul/2021-04068",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04069",
"RefURL": "https://bdu.fstec.ru/vul/2021-04069",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04070",
"RefURL": "https://bdu.fstec.ru/vul/2021-04070",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04071",
"RefURL": "https://bdu.fstec.ru/vul/2021-04071",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04072",
"RefURL": "https://bdu.fstec.ru/vul/2021-04072",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04073",
"RefURL": "https://bdu.fstec.ru/vul/2021-04073",
"Source": "BDU"
},
{
"RefID": "BDU:2021-04558",
"RefURL": "https://bdu.fstec.ru/vul/2021-04558",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06060",
"RefURL": "https://bdu.fstec.ru/vul/2021-06060",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01890",
"RefURL": "https://bdu.fstec.ru/vul/2022-01890",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01891",
"RefURL": "https://bdu.fstec.ru/vul/2022-01891",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02172",
"RefURL": "https://bdu.fstec.ru/vul/2022-02172",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02173",
"RefURL": "https://bdu.fstec.ru/vul/2022-02173",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05736",
"RefURL": "https://bdu.fstec.ru/vul/2022-05736",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05740",
"RefURL": "https://bdu.fstec.ru/vul/2022-05740",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05741",
"RefURL": "https://bdu.fstec.ru/vul/2022-05741",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05744",
"RefURL": "https://bdu.fstec.ru/vul/2022-05744",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06099",
"RefURL": "https://bdu.fstec.ru/vul/2022-06099",
"Source": "BDU"
},
{
"RefID": "CVE-2021-29980",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29980",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29981",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29981",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29982",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29982",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29983",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29983",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29984",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29985",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29985",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29986",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29986",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29987",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29987",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29988",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29988",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29989",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29989",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29990",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29990",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29991",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29991",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29993",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29993",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38491",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38491",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38492",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38492",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38493",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38493",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38494",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38494",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38495",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1196",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 92.0-alt1. \nSecurity Fix(es):\n\n * BDU:2021-04068: Уязвимость браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2021-04069: Уязвимость веб-браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с возникновением конфликта интерпретаций, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-04070: Уязвимость браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2021-04071: Уязвимость браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2021-04072: Уязвимость метода MediaCacheStream::NotifyDataReceived почтового клиента Thunderbird, браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2021-04073: Уязвимость браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2021-04558: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-06060: Уязвимость почтового клиента Thunderbird, браузера Firefox, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)\n\n * BDU:2022-01890: Уязвимость компонента JIT веб-браузера Firefox, почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-01891: Уязвимость компонента JIT веб-браузера Firefox, почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02172: Уязвимость панели разрешений веб-браузера Firefox, почтового клиента Thunderbird, связанная с недостатками процедуры аутентификации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-02173: Уязвимость веб-браузера Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05736: Уязвимость браузера Mozilla Firefox, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05740: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05741: Уязвимость браузера Mozilla Firefox для Android, связанная с ошибками управления ресурсом, позволяющая нарушителю вызвать отказ в обслуживании и раскрыть защищаемую информацию\n\n * BDU:2022-05744: Уязвимость браузера Mozilla Firefox для Android, позволяющая нарушителю вызвать отказ в обслуживании или провести спуфинг-атаки\n\n * BDU:2022-06099: Уязвимость браузера Mozilla Firefox, позволяющая нарушителю провести спуфинг-атаки\n\n * CVE-2021-29980: Uninitialized memory in a canvas object could have caused an incorrect free() leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 78.13, Thunderbird \u003c 91, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29981: An issue present in lowering/register allocation could have led to obscure but deterministic register confusion failures in JITted code that would lead to a potentially exploitable crash. This vulnerability affects Firefox \u003c 91 and Thunderbird \u003c 91.\n\n * CVE-2021-29982: Due to incorrect JIT optimization, we incorrectly interpreted data from the wrong type of object, resulting in the potential leak of a single bit of memory. This vulnerability affects Firefox \u003c 91 and Thunderbird \u003c 91.\n\n * CVE-2021-29983: Firefox for Android could get stuck in fullscreen mode and not exit it even after normal interactions that should cause it to exit. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 91.\n\n * CVE-2021-29984: Instruction reordering resulted in a sequence of instructions that would cause an object to be incorrectly considered during garbage collection. This led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 78.13, Thunderbird \u003c 91, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29985: A use-after-free vulnerability in media channels could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 78.13, Thunderbird \u003c 91, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29986: A suspected race condition when calling getaddrinfo led to memory corruption and a potentially exploitable crash. *Note: This issue only affected Linux operating systems. Other operating systems are unaffected.* This vulnerability affects Thunderbird \u003c 78.13, Thunderbird \u003c 91, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29987: After requesting multiple permissions, and closing the first permission panel, subsequent permission panels will be displayed in a different position but still record a click in the default location, making it possible to trick a user into accepting a permission they did not want to. *This bug only affects Firefox on Linux. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 91 and Thunderbird \u003c 91.\n\n * CVE-2021-29988: Firefox incorrectly treated an inline list-item element as a block element, resulting in an out of bounds read or memory corruption, and a potentially exploitable crash. This vulnerability affects Thunderbird \u003c 78.13, Thunderbird \u003c 91, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29989: Mozilla developers reported memory safety bugs present in Firefox 90 and Firefox ESR 78.12. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 78.13, Firefox ESR \u003c 78.13, and Firefox \u003c 91.\n\n * CVE-2021-29990: Mozilla developers and community members reported memory safety bugs present in Firefox 90. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 91.\n\n * CVE-2021-29991: Firefox incorrectly accepted a newline in a HTTP/3 header, interpretting it as two separate headers. This allowed for a header splitting attack against servers using HTTP/3. This vulnerability affects Firefox \u003c 91.0.1 and Thunderbird \u003c 91.0.1.\n\n * CVE-2021-29993: Firefox for Android allowed navigations through the `intent://` protocol, which could be used to cause crashes and UI spoofs. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 92.\n\n * CVE-2021-38491: Mixed-content checks were unable to analyze opaque origins which led to some mixed content being loaded. This vulnerability affects Firefox \u003c 92.\n\n * CVE-2021-38492: When delegating navigations to the operating system, Firefox would accept the `mk` scheme which might allow attackers to launch pages and execute scripts in Internet Explorer in unprivileged mode. *This bug only affects Firefox for Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 92, Thunderbird \u003c 91.1, Thunderbird \u003c 78.14, Firefox ESR \u003c 78.14, and Firefox ESR \u003c 91.1.\n\n * CVE-2021-38493: Mozilla developers reported memory safety bugs present in Firefox 91 and Firefox ESR 78.13. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR \u003c 78.14, Thunderbird \u003c 78.14, and Firefox \u003c 92.\n\n * CVE-2021-38494: Mozilla developers reported memory safety bugs present in Firefox 91. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 92.\n\n * CVE-2021-38495: Mozilla developers reported memory safety bugs present in Thunderbird 78.13.0. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 91.1 and Firefox ESR \u003c 91.1.\n\n * CVE-2022-1196: After a VR Process is destroyed, a reference to it may have been retained and used, leading to a use-after-free and potentially exploitable crash. This vulnerability affects Thunderbird \u003c 91.8 and Firefox ESR \u003c 91.8.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-09-21"
},
"Updated": {
"Date": "2021-09-21"
},
"BDUs": [
{
"ID": "BDU:2021-04068",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04068",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04069",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-04069",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04070",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04070",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04071",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04071",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04072",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-04072",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04073",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04073",
"Impact": "High",
"Public": "20210810"
},
{
"ID": "BDU:2021-04558",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-04558",
"Impact": "High",
"Public": "20210908"
},
{
"ID": "BDU:2021-06060",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-444",
"Href": "https://bdu.fstec.ru/vul/2021-06060",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "BDU:2022-01890",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2022-01890",
"Impact": "Low",
"Public": "20210817"
},
{
"ID": "BDU:2022-01891",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-01891",
"Impact": "High",
"Public": "20210818"
},
{
"ID": "BDU:2022-02172",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-307",
"Href": "https://bdu.fstec.ru/vul/2022-02172",
"Impact": "Low",
"Public": "20210612"
},
{
"ID": "BDU:2022-02173",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-02173",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "BDU:2022-05736",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05736",
"Impact": "High",
"Public": "20210907"
},
{
"ID": "BDU:2022-05740",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05740",
"Impact": "High",
"Public": "20210907"
},
{
"ID": "BDU:2022-05741",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2022-05741",
"Impact": "Low",
"Public": "20210810"
},
{
"ID": "BDU:2022-05744",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-05744",
"Impact": "High",
"Public": "20210907"
},
{
"ID": "BDU:2022-06099",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2022-06099",
"Impact": "Low",
"Public": "20210907"
}
],
"CVEs": [
{
"ID": "CVE-2021-29980",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-909",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29980",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29981",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29981",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29982",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-772",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29982",
"Impact": "Low",
"Public": "20210817"
},
{
"ID": "CVE-2021-29983",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29983",
"Impact": "Low",
"Public": "20210817"
},
{
"ID": "CVE-2021-29984",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29984",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29985",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29985",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29986",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29986",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29987",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-307",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29987",
"Impact": "Low",
"Public": "20210817"
},
{
"ID": "CVE-2021-29988",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29988",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29989",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29989",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29990",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29990",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "CVE-2021-29991",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-444",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29991",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "CVE-2021-29993",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29993",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "CVE-2021-38491",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38491",
"Impact": "Low",
"Public": "20211103"
},
{
"ID": "CVE-2021-38492",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38492",
"Impact": "Low",
"Public": "20211103"
},
{
"ID": "CVE-2021-38493",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38493",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "CVE-2021-38494",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38494",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "CVE-2021-38495",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38495",
"Impact": "High",
"Public": "20211103"
},
{
"ID": "CVE-2022-1196",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1196",
"Impact": "Low",
"Public": "20221222"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212849001",
"Comment": "firefox is earlier than 0:92.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212849002",
"Comment": "firefox-config-privacy is earlier than 0:92.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212849003",
"Comment": "firefox-wayland is earlier than 0:92.0-alt1"
}
]
}
]
}
}
]
}