543 lines
26 KiB
JSON
543 lines
26 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151704",
|
|
"Version": "oval:org.altlinux.errata:def:20151704",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1704: package `firefox` update to version 40.0.2-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1704",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1704",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11104",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11104",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11105",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11105",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11106",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11106",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11107",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11107",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11108",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11108",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11109",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11109",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11134",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11134",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11135",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11135",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11136",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11136",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11137",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11137",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11138",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11138",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11139",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11139",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11140",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11140",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11241",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11241",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11243",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11243",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11244",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11244",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11245",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11245",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-11246",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-11246",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4473",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4473",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4474",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4474",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4475",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4475",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4477",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4477",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4478",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4478",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4479",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4479",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4480",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4480",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4482",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4482",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4483",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4483",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4484",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4484",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4485",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4485",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4486",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4486",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4487",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4487",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4488",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4488",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4489",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4489",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4490",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4490",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4492",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4492",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-4493",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4493",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades firefox to version 40.0.2-alt1. \nSecurity Fix(es):\n\n * BDU:2015-11104: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11105: Уязвимости браузера Firefox, позволяющие нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11106: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11107: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11108: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11109: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11134: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-11135: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11136: Уязвимость браузеров Firefox, Firefox ESR и операционной системы Firefox OS позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11137: Уязвимость браузеров Firefox, Firefox ESR и операционной системы Firefox OS, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-11138: Уязвимость браузеров Firefox, Firefox ESR и операционной системы Firefox OS, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-11139: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код при помощи объекта \n\n * BDU:2015-11140: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11241: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти политику разграничения доступа\n\n * BDU:2015-11243: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии\n\n * BDU:2015-11244: Уязвимость браузера Firefox, позволяющая нарушителю проводить атаки типа \u0026quot;человек посередине\u0026quot;\n\n * BDU:2015-11245: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-11246: Уязвимость браузера Firefox, позволяющая нарушителю проводить межсайтовый скриптинг\n\n * CVE-2015-4473: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-4474: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 40.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-4475: The mozilla::AudioSink function in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 mishandles inconsistent sample formats within MP3 audio data, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a malformed file.\n\n * CVE-2015-4477: Use-after-free vulnerability in the MediaStream playback feature in Mozilla Firefox before 40.0 allows remote attackers to execute arbitrary code via unspecified use of the Web Audio API.\n\n * CVE-2015-4478: Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 do not impose certain ECMAScript 6 requirements on JavaScript object properties, which allows remote attackers to bypass the Same Origin Policy via the reviver parameter to the JSON.parse method.\n\n * CVE-2015-4479: Multiple integer overflows in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allow remote attackers to execute arbitrary code via a crafted saio chunk in MPEG-4 video data.\n\n * CVE-2015-4480: Integer overflow in the stagefright::SampleTable::isValid function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via crafted MPEG-4 video data with H.264 encoding.\n\n * CVE-2015-4482: mar_read.c in the Updater in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows local users to gain privileges or cause a denial of service (out-of-bounds write) via a crafted name of a Mozilla Archive (aka MAR) file.\n\n * CVE-2015-4483: Mozilla Firefox before 40.0 allows man-in-the-middle attackers to bypass a mixed-content protection mechanism via a feed: URL in a POST request.\n\n * CVE-2015-4484: The js::jit::AssemblerX86Shared::lock_addl function in the JavaScript implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to cause a denial of service (application crash) by leveraging the use of shared memory and accessing (1) an Atomics object or (2) a SharedArrayBuffer object.\n\n * CVE-2015-4485: Heap-based buffer overflow in the resize_context_buffers function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via malformed WebM video data.\n\n * CVE-2015-4486: The decrease_ref_count function in libvpx in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via malformed WebM video data.\n\n * CVE-2015-4487: The nsTSubstring::ReplacePrep function in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, related to an \"overflow.\"\n\n * CVE-2015-4488: Use-after-free vulnerability in the StyleAnimationValue class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 allows remote attackers to have an unspecified impact by leveraging a StyleAnimationValue::operator self assignment.\n\n * CVE-2015-4489: The nsTArray_Impl class in Mozilla Firefox before 40.0, Firefox ESR 38.x before 38.2, and Firefox OS before 2.2 might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging a self assignment.\n\n * CVE-2015-4490: The nsCSPHostSrc::permits function in dom/security/nsCSPUtils.cpp in Mozilla Firefox before 40.0 does not implement the Content Security Policy Level 2 exceptions for the blob, data, and filesystem URL schemes during wildcard source-expression matching, which might make it easier for remote attackers to conduct cross-site scripting (XSS) attacks by leveraging unexpected policy-enforcement behavior.\n\n * CVE-2015-4492: Use-after-free vulnerability in the XMLHttpRequest::Open implementation in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 might allow remote attackers to execute arbitrary code via a SharedWorker object that makes recursive calls to the open method of an XMLHttpRequest object.\n\n * CVE-2015-4493: Heap-based buffer overflow in the stagefright::ESDS::parseESDescriptor function in libstagefright in Mozilla Firefox before 40.0 and Firefox ESR 38.x before 38.2 allows remote attackers to execute arbitrary code via an invalid size field in an esds chunk in MPEG-4 video data, a related issue to CVE-2015-1539.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-08-18"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-08-18"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-11104",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11104",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11105",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11105",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11106",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11106",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11107",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11107",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11108",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11108",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11109",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11109",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11134",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11134",
|
|
"Impact": "High",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11135",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11135",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11136",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11136",
|
|
"Impact": "High",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11137",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11137",
|
|
"Impact": "High",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11138",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11138",
|
|
"Impact": "High",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11139",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11139",
|
|
"Impact": "High",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11140",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11140",
|
|
"Impact": "Critical",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11241",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11241",
|
|
"Impact": "Low",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11243",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11243",
|
|
"Impact": "Low",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11244",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11244",
|
|
"Impact": "Low",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11245",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11245",
|
|
"Impact": "Low",
|
|
"Public": "20150811"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-11246",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-11246",
|
|
"Impact": "Low",
|
|
"Public": "20150811"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-4473",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4473",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4474",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4474",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4475",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4475",
|
|
"Impact": "High",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4477",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4477",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4478",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4478",
|
|
"Impact": "Low",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4479",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4479",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4480",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4480",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4482",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4482",
|
|
"Impact": "Low",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4483",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4483",
|
|
"Impact": "Low",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4484",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4484",
|
|
"Impact": "Low",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4485",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4485",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4486",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4486",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4487",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4487",
|
|
"Impact": "High",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4488",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4488",
|
|
"Impact": "High",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4489",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4489",
|
|
"Impact": "High",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4490",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4490",
|
|
"Impact": "Low",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4492",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4492",
|
|
"Impact": "High",
|
|
"Public": "20150816"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-4493",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4493",
|
|
"Impact": "Critical",
|
|
"Public": "20150816"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151704001",
|
|
"Comment": "firefox is earlier than 0:40.0.2-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151704002",
|
|
"Comment": "rpm-build-firefox is earlier than 0:40.0.2-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |