vuln-list-alt/oval/p11/ALT-PU-2019-2098/definitions.json
2024-12-12 21:07:30 +00:00

121 lines
4.6 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20192098",
"Version": "oval:org.altlinux.errata:def:20192098",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-2098: package `firefox` update to version 67.0.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-2098",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-2098",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-03613",
"RefURL": "https://bdu.fstec.ru/vul/2019-03613",
"Source": "BDU"
},
{
"RefID": "CVE-2019-11702",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11702",
"Source": "CVE"
},
{
"RefID": "CVE-2019-11707",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-11707",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 67.0.3-alt1. \nSecurity Fix(es):\n\n * BDU:2019-03613: Уязвимость метода Array.pop почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-11702: A hyperlink using protocols associated with Internet Explorer, such as IE.HTTP:, can be used to open local files at a known location with Internet Explorer if a user approves execution when prompted. *Note: this issue only occurs on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 67.0.2.\n\n * CVE-2019-11707: A type confusion vulnerability can occur when manipulating JavaScript objects due to issues in Array.pop. This can allow for an exploitable crash. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Firefox ESR \u003c 60.7.1, Firefox \u003c 67.0.3, and Thunderbird \u003c 60.7.2.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-06-19"
},
"Updated": {
"Date": "2019-06-19"
},
"BDUs": [
{
"ID": "BDU:2019-03613",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-03613",
"Impact": "High",
"Public": "20190723"
}
],
"CVEs": [
{
"ID": "CVE-2019-11702",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11702",
"Impact": "Low",
"Public": "20190723"
},
{
"ID": "CVE-2019-11707",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-11707",
"Impact": "High",
"Public": "20190723"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20192098001",
"Comment": "firefox is earlier than 0:67.0.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192098002",
"Comment": "firefox-wayland is earlier than 0:67.0.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20192098003",
"Comment": "rpm-build-firefox is earlier than 0:67.0.3-alt1"
}
]
}
]
}
}
]
}