780 lines
40 KiB
JSON
780 lines
40 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161283",
|
|
"Version": "oval:org.altlinux.errata:def:20161283",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1283: package `chromium` update to version 49.0.2623.108-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1283",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1283",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-12011",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-12011",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00641",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00641",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00642",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00642",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00643",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00643",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00644",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00644",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00645",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00645",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00646",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00646",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00647",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00647",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00648",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00648",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00649",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00649",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00650",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00650",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00651",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00651",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00652",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00652",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00653",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00653",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00654",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00654",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00655",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00655",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00656",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00656",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00768",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00768",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00769",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00769",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00770",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00770",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00907",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00907",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00911",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00911",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00912",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00912",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00913",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00913",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00914",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00914",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00915",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00915",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-8126",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-8126",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1630",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1631",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1632",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1633",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1634",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1635",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1636",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1637",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1638",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1639",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1640",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1641",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1642",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1643",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1643",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1644",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1644",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1645",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1645",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1646",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1646",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1647",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1647",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1648",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1648",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1649",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1649",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1650",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1650",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2843",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2844",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2845",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-3679",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-3679",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 49.0.2623.108-alt1. \nSecurity Fix(es):\n\n * BDU:2015-12011: Уязвимости библиотеки libpng, позволяющие нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00641: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2016-00642: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2016-00643: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2016-00644: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00645: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00646: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00647: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти механизмы защиты целостности Subresource\n\n * BDU:2016-00648: Уязвимость браузера Google Chrome, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-00649: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2016-00650: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00651: Уязвимость браузера Google Chrome, позволяющая нарушителю повлиять на целостность информации\n\n * BDU:2016-00652: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00653: Уязвимости браузера Google Chrome, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании\n\n * BDU:2016-00654: Уязвимости браузера Google Chrome и браузерного ядра V8, позволяющие нарушителю оказать другое воздействие или вызвать отказ в обслуживании\n\n * BDU:2016-00655: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00656: Уязвимость браузера Google Chrome, позволяющая нарушителю получить конфиденциальную информацию\n\n * BDU:2016-00768: Уязвимости браузера Google Chrome, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00769: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00770: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00907: Уязвимости браузерного движка V8, позволяющие нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00911: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00912: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00913: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00914: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00915: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * CVE-2015-8126: Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.\n\n * CVE-2016-1630: The ContainerNode::parserRemoveChild function in WebKit/Source/core/dom/ContainerNode.cpp in Blink, as used in Google Chrome before 49.0.2623.75, mishandles widget updates, which makes it easier for remote attackers to bypass the Same Origin Policy via a crafted web site.\n\n * CVE-2016-1631: The PPB_Flash_MessageLoop_Impl::InternalRun function in content/renderer/pepper/ppb_flash_message_loop_impl.cc in the Pepper plugin in Google Chrome before 49.0.2623.75 mishandles nested message loops, which allows remote attackers to bypass the Same Origin Policy via a crafted web site.\n\n * CVE-2016-1632: The Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly maintain own properties, which allows remote attackers to bypass intended access restrictions via crafted JavaScript code that triggers an incorrect cast, related to extensions/renderer/v8_helpers.h and gin/converter.h.\n\n * CVE-2016-1633: Use-after-free vulnerability in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1634: Use-after-free vulnerability in the StyleResolver::appendCSSStyleSheet function in WebKit/Source/core/css/resolver/StyleResolver.cpp in Blink, as used in Google Chrome before 49.0.2623.75, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted web site that triggers Cascading Style Sheets (CSS) style invalidation during a certain subtree-removal action.\n\n * CVE-2016-1635: extensions/renderer/render_frame_observer_natives.cc in Google Chrome before 49.0.2623.75 does not properly consider object lifetimes and re-entrancy issues during OnDocumentElementCreated handling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1636: The PendingScript::notifyFinished function in WebKit/Source/core/dom/PendingScript.cpp in Google Chrome before 49.0.2623.75 relies on memory-cache information about integrity-check occurrences instead of integrity-check successes, which allows remote attackers to bypass the Subresource Integrity (aka SRI) protection mechanism by triggering two loads of the same resource.\n\n * CVE-2016-1637: The SkATan2_255 function in effects/gradients/SkSweepGradient.cpp in Skia, as used in Google Chrome before 49.0.2623.75, mishandles arctangent calculations, which allows remote attackers to obtain sensitive information via a crafted web site.\n\n * CVE-2016-1638: extensions/renderer/resources/platform_app.js in the Extensions subsystem in Google Chrome before 49.0.2623.75 does not properly restrict use of Web APIs, which allows remote attackers to bypass intended access restrictions via a crafted platform app.\n\n * CVE-2016-1639: Use-after-free vulnerability in browser/extensions/api/webrtc_audio_private/webrtc_audio_private_api.cc in the WebRTC Audio Private API implementation in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect reliance on the resource context pointer.\n\n * CVE-2016-1640: The Web Store inline-installer implementation in the Extensions UI in Google Chrome before 49.0.2623.75 does not block installations upon deletion of an installation frame, which makes it easier for remote attackers to trick a user into believing that an installation request originated from the user's next navigation target via a crafted web site.\n\n * CVE-2016-1641: Use-after-free vulnerability in content/browser/web_contents/web_contents_impl.cc in Google Chrome before 49.0.2623.75 allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an image download after a certain data structure is deleted, as demonstrated by a favicon.ico download.\n\n * CVE-2016-1642: Multiple unspecified vulnerabilities in Google Chrome before 49.0.2623.75 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2016-1643: The ImageInputType::ensurePrimaryContent function in WebKit/Source/core/html/forms/ImageInputType.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly maintain the user agent shadow DOM, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that leverage \"type confusion.\"\n\n * CVE-2016-1644: WebKit/Source/core/layout/LayoutObject.cpp in Blink, as used in Google Chrome before 49.0.2623.87, does not properly restrict relayout scheduling, which allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via a crafted HTML document.\n\n * CVE-2016-1645: Multiple integer signedness errors in the opj_j2k_update_image_data function in j2k.c in OpenJPEG, as used in PDFium in Google Chrome before 49.0.2623.87, allow remote attackers to cause a denial of service (incorrect cast and out-of-bounds write) or possibly have unspecified other impact via crafted JPEG 2000 data.\n\n * CVE-2016-1646: The Array.prototype.concat implementation in builtins.cc in Google V8, as used in Google Chrome before 49.0.2623.108, does not properly consider element data types, which allows remote attackers to cause a denial of service (out-of-bounds read) or possibly have unspecified other impact via crafted JavaScript code.\n\n * CVE-2016-1647: Use-after-free vulnerability in the RenderWidgetHostImpl::Destroy function in content/browser/renderer_host/render_widget_host_impl.cc in the Navigation implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1648: Use-after-free vulnerability in the GetLoadTimes function in renderer/loadtimes_extension_bindings.cc in the Extensions implementation in Google Chrome before 49.0.2623.108 allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code.\n\n * CVE-2016-1649: The Program::getUniformInternal function in Program.cpp in libANGLE, as used in Google Chrome before 49.0.2623.108, does not properly handle a certain data-type mismatch, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted shader stages.\n\n * CVE-2016-1650: The PageCaptureSaveAsMHTMLFunction::ReturnFailure function in browser/extensions/api/page_capture/page_capture_api.cc in Google Chrome before 49.0.2623.108 allows attackers to cause a denial of service or possibly have unspecified other impact by triggering an error in creating an MHTML document.\n\n * CVE-2016-2843: Multiple unspecified vulnerabilities in Google V8 before 4.9.385.26, as used in Google Chrome before 49.0.2623.75, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2016-2844: WebKit/Source/core/layout/LayoutBlock.cpp in Blink, as used in Google Chrome before 49.0.2623.75, does not properly determine when anonymous block wrappers may exist, which allows remote attackers to cause a denial of service (incorrect cast and assertion failure) or possibly have unspecified other impact via crafted JavaScript code.\n\n * CVE-2016-2845: The Content Security Policy (CSP) implementation in Blink, as used in Google Chrome before 49.0.2623.75, does not ignore a URL's path component in the case of a ServiceWorker fetch, which allows remote attackers to obtain sensitive information about visited web pages by reading CSP violation reports, related to FrameFetchContext.cpp and ResourceFetcher.cpp.\n\n * CVE-2016-3679: Multiple unspecified vulnerabilities in Google V8 before 4.9.385.33, as used in Google Chrome before 49.0.2623.108, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-03-25"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-03-25"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-12011",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-12011",
|
|
"Impact": "High",
|
|
"Public": "20151113"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00641",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00641",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00642",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00642",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00643",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00643",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00644",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00644",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00645",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00645",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00646",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00646",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00647",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00647",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00648",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00648",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00649",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00649",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00650",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00650",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00651",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00651",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00652",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00652",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00653",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00653",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00654",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00654",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00655",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00655",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00656",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00656",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00768",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00768",
|
|
"Impact": "Critical",
|
|
"Public": "20160314"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00769",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00769",
|
|
"Impact": "Critical",
|
|
"Public": "20160314"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00770",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-361",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00770",
|
|
"Impact": "Critical",
|
|
"Public": "20160314"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00907",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00907",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00911",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00911",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00912",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00912",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00913",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00913",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00914",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00914",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00915",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00915",
|
|
"Impact": "Critical",
|
|
"Public": "20160329"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-8126",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-8126",
|
|
"Impact": "High",
|
|
"Public": "20151113"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1630",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1630",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1631",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1631",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1632",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1632",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1633",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1633",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1634",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1634",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1635",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1635",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1636",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1636",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1637",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1637",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1638",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1638",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1639",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1639",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1640",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1640",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1641",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1641",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1642",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1642",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1643",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-361",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1643",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1644",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1644",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1645",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1645",
|
|
"Impact": "High",
|
|
"Public": "20160313"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1646",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1646",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1647",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1647",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1648",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1648",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1649",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1649",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1650",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1650",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2843",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2843",
|
|
"Impact": "Critical",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2844",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2844",
|
|
"Impact": "High",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2845",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2845",
|
|
"Impact": "Low",
|
|
"Public": "20160306"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-3679",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-3679",
|
|
"Impact": "High",
|
|
"Public": "20160329"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161283001",
|
|
"Comment": "chromium is earlier than 0:49.0.2623.108-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161283002",
|
|
"Comment": "chromium-gnome is earlier than 0:49.0.2623.108-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161283003",
|
|
"Comment": "chromium-kde is earlier than 0:49.0.2623.108-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |