vuln-list-alt/oval/p11/ALT-PU-2021-1919/definitions.json
2024-12-12 21:07:30 +00:00

335 lines
17 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20211919",
"Version": "oval:org.altlinux.errata:def:20211919",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-1919: package `firefox` update to version 89.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-1919",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-1919",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-02858",
"RefURL": "https://bdu.fstec.ru/vul/2021-02858",
"Source": "BDU"
},
{
"RefID": "BDU:2021-02898",
"RefURL": "https://bdu.fstec.ru/vul/2021-02898",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05606",
"RefURL": "https://bdu.fstec.ru/vul/2022-05606",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05609",
"RefURL": "https://bdu.fstec.ru/vul/2022-05609",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05612",
"RefURL": "https://bdu.fstec.ru/vul/2022-05612",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05613",
"RefURL": "https://bdu.fstec.ru/vul/2022-05613",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05737",
"RefURL": "https://bdu.fstec.ru/vul/2022-05737",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06096",
"RefURL": "https://bdu.fstec.ru/vul/2022-06096",
"Source": "BDU"
},
{
"RefID": "BDU:2022-06103",
"RefURL": "https://bdu.fstec.ru/vul/2022-06103",
"Source": "BDU"
},
{
"RefID": "CVE-2021-29959",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29959",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29960",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29960",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29961",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29961",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29962",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29962",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29963",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29963",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29964",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29964",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29965",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29965",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29966",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29966",
"Source": "CVE"
},
{
"RefID": "CVE-2021-29967",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-29967",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 89.0-alt1. \nSecurity Fix(es):\n\n * BDU:2021-02858: Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2021-02898: Уязвимость почтового клиента Mozilla Thunderbird, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2022-05606: Уязвимость браузера Mozilla Firefox, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-05609: Уязвимость браузера Mozilla Firefox, связанная с отсутствием проверки корректности принимаемых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность\n\n * BDU:2022-05612: Уязвимость функции \u0026quot;Приватный Просмотр\u0026quot; браузера Mozilla Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05613: Уязвимость браузера Mozilla Firefox, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05737: Уязвимость браузера Mozilla Firefox, связанная с ошибками авторизации, позволяющая нарушителю обойти существующие ограничения безопасности\n\n * BDU:2022-06096: Уязвимость браузера Mozilla Firefox, связанная с недостатками контроля доступа, позволяющая нарушителю видоизменять пользовательский интерфейс\n\n * BDU:2022-06103: Уязвимость браузера Firefox for Android, связанная с ошибками при обработке гипертекстовых ссылок, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * CVE-2021-29959: When a user has already allowed a website to access microphone and camera, disabling camera sharing would not fully prevent the website from re-enabling it without an additional prompt. This was only possible if the website kept recording with the microphone until re-enabling the camera. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29960: Firefox used to cache the last filename used for printing a file. When generating a filename for printing, Firefox usually suggests the web page title. The caching and suggestion techniques combined may have lead to the title of a website visited during private browsing mode being stored on disk. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29961: When styling and rendering an oversized `\u003cselect\u003e` element, Firefox did not apply correct clipping which allowed an attacker to paint over the user interface. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29962: Firefox for Android would become unstable and hard-to-recover when a website opened too many popups. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29963: Address bar search suggestions in private browsing mode were re-using session data from normal mode. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29964: A locally-installed hostile program could send `WM_COPYDATA` messages that Firefox would process incorrectly, leading to an out-of-bounds read. *This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Thunderbird \u003c 78.11, Firefox \u003c 89, and Firefox ESR \u003c 78.11.\n\n * CVE-2021-29965: A malicious website that causes an HTTP Authentication dialog to be spawned could trick the built-in password manager to suggest passwords for the currently active website instead of the website that triggered the dialog. *This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29966: Mozilla developers reported memory safety bugs present in Firefox 88. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 89.\n\n * CVE-2021-29967: Mozilla developers reported memory safety bugs present in Firefox 88 and Firefox ESR 78.11. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 78.11, Firefox \u003c 89, and Firefox ESR \u003c 78.11.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-06-03"
},
"Updated": {
"Date": "2021-06-03"
},
"BDUs": [
{
"ID": "BDU:2021-02858",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-02858",
"Impact": "High",
"Public": "20210601"
},
{
"ID": "BDU:2021-02898",
"CVSS": "AV:L/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-02898",
"Impact": "Low",
"Public": "20210603"
},
{
"ID": "BDU:2022-05606",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05606",
"Impact": "High",
"Public": "20210624"
},
{
"ID": "BDU:2022-05609",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-669",
"Href": "https://bdu.fstec.ru/vul/2022-05609",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "BDU:2022-05612",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-345",
"Href": "https://bdu.fstec.ru/vul/2022-05612",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "BDU:2022-05613",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-404",
"Href": "https://bdu.fstec.ru/vul/2022-05613",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "BDU:2022-05737",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-264, CWE-863",
"Href": "https://bdu.fstec.ru/vul/2022-05737",
"Impact": "Low",
"Public": "20210601"
},
{
"ID": "BDU:2022-06096",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://bdu.fstec.ru/vul/2022-06096",
"Impact": "Low",
"Public": "20220601"
},
{
"ID": "BDU:2022-06103",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-610",
"Href": "https://bdu.fstec.ru/vul/2022-06103",
"Impact": "Low",
"Public": "20210601"
}
],
"CVEs": [
{
"ID": "CVE-2021-29959",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29959",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29960",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-669",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29960",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29961",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-863",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29961",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29962",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-404",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29962",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29963",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-345",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29963",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29964",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29964",
"Impact": "High",
"Public": "20210624"
},
{
"ID": "CVE-2021-29965",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-610",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29965",
"Impact": "Low",
"Public": "20210624"
},
{
"ID": "CVE-2021-29966",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29966",
"Impact": "High",
"Public": "20210624"
},
{
"ID": "CVE-2021-29967",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-29967",
"Impact": "High",
"Public": "20210624"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20211919001",
"Comment": "firefox is earlier than 0:89.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211919002",
"Comment": "firefox-config-privacy is earlier than 0:89.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211919003",
"Comment": "firefox-wayland is earlier than 0:89.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20211919004",
"Comment": "rpm-build-firefox is earlier than 0:89.0-alt1"
}
]
}
]
}
}
]
}