1028 lines
53 KiB
JSON
1028 lines
53 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151589",
|
|
"Version": "oval:org.altlinux.errata:def:20151589",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1589: package `chromium` update to version 43.0.2357.130-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1589",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1589",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09964",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09964",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09965",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09965",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09966",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09966",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09967",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09967",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09968",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09968",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09969",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09969",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09970",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09970",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09971",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09971",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09972",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09972",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09973",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09973",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09974",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09974",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09975",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09975",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09976",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09976",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10029",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10029",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10030",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10030",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10124",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10124",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10125",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10125",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10126",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10126",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10127",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10127",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10128",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10128",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10129",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10129",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10130",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10130",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10131",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10131",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10132",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10132",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10133",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10133",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10134",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10134",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10135",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10135",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10136",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10136",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10137",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10137",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10505",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10505",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10517",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10517",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10518",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10518",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-10519",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-10519",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2020-04522",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2020-04522",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1235",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1235",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1236",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1236",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1237",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1237",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1238",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1238",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1240",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1240",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1241",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1241",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1242",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1242",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1243",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1243",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1244",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1244",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1245",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1245",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1246",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1246",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1247",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1247",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1248",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1248",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1249",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1249",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1250",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1250",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1251",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1251",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1252",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1252",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1253",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1253",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1254",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1254",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1255",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1255",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1256",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1256",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1257",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1257",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1258",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1258",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1259",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1259",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1260",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1260",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1261",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1261",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1262",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1262",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1263",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1263",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1264",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1264",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1265",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1265",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1266",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1266",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1267",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1267",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1268",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1268",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-1269",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-1269",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3333",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3333",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3334",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3334",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3335",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3335",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-3336",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-3336",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 43.0.2357.130-alt1. \nSecurity Fix(es):\n\n * BDU:2015-09964: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю обойти правила ограничения домена\n\n * BDU:2015-09965: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю получить доступ к значениям образцов аудио\n\n * BDU:2015-09966: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-09967: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-09968: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09969: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю выполнить действия, непредусмотренные интерфейсом браузера\n\n * BDU:2015-09970: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-09971: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю получить доступ к защищаемой информации\n\n * BDU:2015-09972: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-09973: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-09974: Уязвимость браузера Google Chrome, позволяющая удаленному нарушителю получить доступ к локальным файлам\n\n * BDU:2015-09975: Уязвимость интерфейса File System API браузера Google Chrome, позволяющая удаленному нарушителю обойти защитный механизм SafeBrowsing\n\n * BDU:2015-09976: Уязвимости браузера Google Chrome, позволяющие удаленному нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-10029: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2015-10030: Уязвимость браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных\n\n * BDU:2015-10124: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10125: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти механизм песочницы или вызвать отказ в обслуживании\n\n * BDU:2015-10126: Уязвимость браузера Google Chrome, позволяющая нарушителю внедрить команды в выполняемый сценарий\n\n * BDU:2015-10127: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти правила разграничения доступа\n\n * BDU:2015-10128: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10129: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10130: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10131: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10132: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10133: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10134: Уязвимость браузера Google Chrome, позволяющая нарушителю подменить данные\n\n * BDU:2015-10135: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10136: Уязвимость браузера Google Chrome, позволяющая нарушителю подменить данные\n\n * BDU:2015-10137: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10505: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа\n\n * BDU:2015-10517: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа\n\n * BDU:2015-10518: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа\n\n * BDU:2015-10519: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа\n\n * BDU:2020-04522: Уязвимость функции CertificateResourceHandler, обрабатывающей MIME сертификаты, браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2015-1235: The ContainerNode::parserRemoveChild function in core/dom/ContainerNode.cpp in the HTML parser in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy via a crafted HTML document with an IFRAME element.\n\n * CVE-2015-1236: The MediaElementAudioSourceNode::process function in modules/webaudio/MediaElementAudioSourceNode.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to bypass the Same Origin Policy and obtain sensitive audio sample values via a crafted web site containing a media element.\n\n * CVE-2015-1237: Use-after-free vulnerability in the RenderFrameImpl::OnMessageReceived function in content/renderer/render_frame_impl.cc in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service or possibly have unspecified other impact via vectors that trigger renderer IPC messages during a detach operation.\n\n * CVE-2015-1238: Skia, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-1240: gpu/blink/webgraphicscontext3d_impl.cc in the WebGL implementation in Google Chrome before 42.0.2311.90 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WebGL program that triggers a state inconsistency.\n\n * CVE-2015-1241: Google Chrome before 42.0.2311.90 does not properly consider the interaction of page navigation with the handling of touch events and gesture events, which allows remote attackers to trigger unintended UI actions via a crafted web site that conducts a \"tapjacking\" attack.\n\n * CVE-2015-1242: The ReduceTransitionElementsKind function in hydrogen-check-elimination.cc in Google V8 before 4.2.77.8, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that leverages \"type confusion\" in the check-elimination optimization.\n\n * CVE-2015-1243: Use-after-free vulnerability in the MutationObserver::disconnect function in core/dom/MutationObserver.cpp in the DOM implementation in Blink, as used in Google Chrome before 42.0.2311.135, allows remote attackers to cause a denial of service or possibly have unspecified other impact by triggering an attempt to unregister a MutationObserver object that is not currently registered.\n\n * CVE-2015-1244: The URLRequest::GetHSTSRedirect function in url_request/url_request.cc in Google Chrome before 42.0.2311.90 does not replace the ws scheme with the wss scheme whenever an HSTS Policy is active, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for WebSocket traffic.\n\n * CVE-2015-1245: Use-after-free vulnerability in the OpenPDFInReaderView::Update function in browser/ui/views/location_bar/open_pdf_in_reader_view.cc in Google Chrome before 41.0.2272.76 might allow user-assisted remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by triggering interaction with a PDFium \"Open PDF in Reader\" button that has an invalid tab association.\n\n * CVE-2015-1246: Blink, as used in Google Chrome before 42.0.2311.90, allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors.\n\n * CVE-2015-1247: The SearchEngineTabHelper::OnPageHasOSDD function in browser/ui/search_engines/search_engine_tab_helper.cc in Google Chrome before 42.0.2311.90 does not prevent use of a file: URL for an OpenSearch descriptor XML document, which might allow remote attackers to obtain sensitive information from local files via a crafted (1) http or (2) https web site.\n\n * CVE-2015-1248: The FileSystem API in Google Chrome before 40.0.2214.91 allows remote attackers to bypass the SafeBrowsing for Executable Files protection mechanism by creating a .exe file in a temporary filesystem and then referencing this file with a filesystem:http: URL.\n\n * CVE-2015-1249: Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.90 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1250: Multiple unspecified vulnerabilities in Google Chrome before 42.0.2311.135 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1251: Use-after-free vulnerability in the SpeechRecognitionClient implementation in the Speech subsystem in Google Chrome before 43.0.2357.65 allows remote attackers to execute arbitrary code via a crafted document.\n\n * CVE-2015-1252: common/partial_circular_buffer.cc in Google Chrome before 43.0.2357.65 does not properly handle wraps, which allows remote attackers to bypass a sandbox protection mechanism or cause a denial of service (out-of-bounds write) via vectors that trigger a write operation with a large amount of data, related to the PartialCircularBuffer::Write and PartialCircularBuffer::DoWrite functions.\n\n * CVE-2015-1253: core/html/parser/HTMLConstructionSite.cpp in the DOM implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that appends a child to a SCRIPT element, related to the insert and executeReparentTask functions.\n\n * CVE-2015-1254: core/dom/Document.cpp in Blink, as used in Google Chrome before 43.0.2357.65, enables the inheritance of the designMode attribute, which allows remote attackers to bypass the Same Origin Policy by leveraging the availability of editing.\n\n * CVE-2015-1255: Use-after-free vulnerability in content/renderer/media/webaudio_capturer_source.cc in the WebAudio implementation in Google Chrome before 43.0.2357.65 allows remote attackers to cause a denial of service (heap memory corruption) or possibly have unspecified other impact by leveraging improper handling of a stop action for an audio track.\n\n * CVE-2015-1256: Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted document that leverages improper handling of a shadow tree for a use element.\n\n * CVE-2015-1257: platform/graphics/filters/FEColorMatrix.cpp in the SVG implementation in Blink, as used in Google Chrome before 43.0.2357.65, does not properly handle an insufficient number of values in an feColorMatrix filter, which allows remote attackers to cause a denial of service (container overflow) or possibly have unspecified other impact via a crafted document.\n\n * CVE-2015-1258: Google Chrome before 43.0.2357.65 relies on libvpx code that was not built with an appropriate --size-limit value, which allows remote attackers to trigger a negative value for a size field, and consequently cause a denial of service or possibly have unspecified other impact, via a crafted frame size in VP9 video data.\n\n * CVE-2015-1259: PDFium, as used in Google Chrome before 43.0.2357.65, does not properly initialize memory, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2015-1260: Multiple use-after-free vulnerabilities in content/renderer/media/user_media_client_impl.cc in the WebRTC implementation in Google Chrome before 43.0.2357.65 allow remote attackers to cause a denial of service or possibly have unspecified other impact via crafted JavaScript code that executes upon completion of a getUserMedia request.\n\n * CVE-2015-1261: android/java/src/org/chromium/chrome/browser/WebsiteSettingsPopup.java in Google Chrome before 43.0.2357.65 on Android does not properly restrict use of a URL's fragment identifier during construction of a page-info popup, which allows remote attackers to spoof the URL bar or deliver misleading popup content via crafted text.\n\n * CVE-2015-1262: platform/fonts/shaping/HarfBuzzShaper.cpp in Blink, as used in Google Chrome before 43.0.2357.65, does not initialize a certain width field, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via crafted Unicode text.\n\n * CVE-2015-1263: The Spellcheck API implementation in Google Chrome before 43.0.2357.65 does not use an HTTPS session for downloading a Hunspell dictionary, which allows man-in-the-middle attackers to deliver incorrect spelling suggestions or possibly have unspecified other impact via a crafted file.\n\n * CVE-2015-1264: Cross-site scripting (XSS) vulnerability in Google Chrome before 43.0.2357.65 allows user-assisted remote attackers to inject arbitrary web script or HTML via crafted data that is improperly handled by the Bookmarks feature.\n\n * CVE-2015-1265: Multiple unspecified vulnerabilities in Google Chrome before 43.0.2357.65 allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-1266: content/browser/webui/content_web_ui_controller_factory.cc in Google Chrome before 43.0.2357.130 does not properly consider the scheme in determining whether a URL is associated with a WebUI SiteInstance, which allows remote attackers to bypass intended access restrictions via a similar URL, as demonstrated by use of http://gpu when there is a WebUI class for handling chrome://gpu requests.\n\n * CVE-2015-1267: Blink, as used in Google Chrome before 43.0.2357.130, does not properly restrict the creation context during creation of a DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code that uses a Blink public API, related to WebArrayBufferConverter.cpp, WebBlob.cpp, WebDOMError.cpp, and WebDOMFileSystem.cpp.\n\n * CVE-2015-1268: bindings/scripts/v8_types.py in Blink, as used in Google Chrome before 43.0.2357.130, does not properly select a creation context for a return value's DOM wrapper, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code, as demonstrated by use of a data: URL.\n\n * CVE-2015-1269: The DecodeHSTSPreloadRaw function in net/http/transport_security_state.cc in Google Chrome before 43.0.2357.130 does not properly canonicalize DNS hostnames before making comparisons to HSTS or HPKP preload entries, which allows remote attackers to bypass intended access restrictions via a string that (1) ends in a . (dot) character or (2) is not entirely lowercase.\n\n * CVE-2015-3333: Multiple unspecified vulnerabilities in Google V8 before 4.2.77.14, as used in Google Chrome before 42.0.2311.90, allow attackers to cause a denial of service or possibly have other impact via unknown vectors.\n\n * CVE-2015-3334: browser/ui/website_settings/website_settings.cc in Google Chrome before 42.0.2311.90 does not always display \"Media: Allowed by you\" in a Permissions table after the user has granted camera permission to a web site, which might make it easier for user-assisted remote attackers to obtain sensitive video data from a device's physical environment via a crafted web site that turns on the camera at a time when the user believes that camera access is prohibited.\n\n * CVE-2015-3335: The NaClSandbox::InitializeLayerTwoSandbox function in components/nacl/loader/sandbox_linux/nacl_sandbox_linux.cc in Google Chrome before 42.0.2311.90 does not have RLIMIT_AS and RLIMIT_DATA limits for Native Client (aka NaCl) processes, which might make it easier for remote attackers to conduct row-hammer attacks or have unspecified other impact by leveraging the ability to run a crafted program in the NaCl sandbox.\n\n * CVE-2015-3336: Google Chrome before 42.0.2311.90 does not always ask the user before proceeding with CONTENT_SETTINGS_TYPE_FULLSCREEN and CONTENT_SETTINGS_TYPE_MOUSELOCK changes, which allows user-assisted remote attackers to cause a denial of service (UI disruption) by constructing a crafted HTML document containing JavaScript code with requestFullScreen and requestPointerLock calls, and arranging for the user to access this document with a file: URL.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-07-03"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-07-03"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-09964",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09964",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09965",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09965",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09966",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09966",
|
|
"Impact": "High",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09967",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09967",
|
|
"Impact": "High",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09968",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09968",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09969",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09969",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09970",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09970",
|
|
"Impact": "High",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09971",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09971",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09972",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09972",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09973",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09973",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09974",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09974",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09975",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09975",
|
|
"Impact": "Low",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09976",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09976",
|
|
"Impact": "High",
|
|
"Public": "20150414"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10029",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10029",
|
|
"Impact": "High",
|
|
"Public": "20150428"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10030",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10030",
|
|
"Impact": "High",
|
|
"Public": "20150428"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10124",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10124",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10125",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10125",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10126",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10126",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10127",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10127",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10128",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10128",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10129",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10129",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10130",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10130",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10131",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10131",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10132",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10132",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10133",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10133",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10134",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10134",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10135",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10135",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10136",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-300",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10136",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10137",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10137",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10505",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10505",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10517",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10517",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10518",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10518",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-10519",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-10519",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "BDU:2020-04522",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-122",
|
|
"Href": "https://bdu.fstec.ru/vul/2020-04522",
|
|
"Impact": "High",
|
|
"Public": "20150504"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2015-1235",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1235",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1236",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1236",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1237",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1237",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1238",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1238",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1240",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1240",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1241",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-1021",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1241",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1242",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1242",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1243",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1243",
|
|
"Impact": "High",
|
|
"Public": "20150501"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1244",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1244",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1245",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1245",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1246",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1246",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1247",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1247",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1248",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1248",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1249",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1249",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1250",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1250",
|
|
"Impact": "High",
|
|
"Public": "20150501"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1251",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1251",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1252",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1252",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1253",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1253",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1254",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1254",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1255",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1255",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1256",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1256",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1257",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1257",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1258",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1258",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1259",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1259",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1260",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1260",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1261",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1261",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1262",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1262",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1263",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1263",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1264",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1264",
|
|
"Impact": "Low",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1265",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1265",
|
|
"Impact": "High",
|
|
"Public": "20150520"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1266",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1266",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1267",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1267",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1268",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1268",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-1269",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-1269",
|
|
"Impact": "Low",
|
|
"Public": "20150626"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3333",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3333",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3334",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3334",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3335",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3335",
|
|
"Impact": "High",
|
|
"Public": "20150419"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-3336",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-3336",
|
|
"Impact": "Low",
|
|
"Public": "20150419"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151589001",
|
|
"Comment": "chromium is earlier than 0:43.0.2357.130-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151589002",
|
|
"Comment": "chromium-gnome is earlier than 0:43.0.2357.130-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151589003",
|
|
"Comment": "chromium-kde is earlier than 0:43.0.2357.130-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |