2024-12-12 21:07:30 +00:00

307 lines
14 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161057",
"Version": "oval:org.altlinux.errata:def:20161057",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1057: package `firefox` update to version 44.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1057",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1057",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-00509",
"RefURL": "https://bdu.fstec.ru/vul/2016-00509",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00510",
"RefURL": "https://bdu.fstec.ru/vul/2016-00510",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00511",
"RefURL": "https://bdu.fstec.ru/vul/2016-00511",
"Source": "BDU"
},
{
"RefID": "BDU:2016-00512",
"RefURL": "https://bdu.fstec.ru/vul/2016-00512",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00029",
"RefURL": "https://bdu.fstec.ru/vul/2018-00029",
"Source": "BDU"
},
{
"RefID": "CVE-2016-1930",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1930",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1931",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1931",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1933",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1933",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1935",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1935",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1937",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1937",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1939",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1939",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1942",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1942",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1944",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1944",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1945",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1945",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1946",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1946",
"Source": "CVE"
},
{
"RefID": "CVE-2016-1947",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1947",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 44.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00509: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00510: Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00511: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00512: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2018-00029: Уязвимость функции BufferSubData() почтового клиента Thunderbird и браузеров Firefox позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2016-1930: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-1931: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.\n\n * CVE-2016-1933: Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.\n\n * CVE-2016-1935: Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.\n\n * CVE-2016-1937: The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.\n\n * CVE-2016-1939: Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.\n\n * CVE-2016-1942: Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.\n\n * CVE-2016-1944: The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.\n\n * CVE-2016-1945: The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.\n\n * CVE-2016-1946: The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.\n\n * CVE-2016-1947: Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-01-28"
},
"Updated": {
"Date": "2016-01-28"
},
"BDUs": [
{
"ID": "BDU:2016-00509",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00509",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00510",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00510",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00511",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-00511",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2016-00512",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2016-00512",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "BDU:2018-00029",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2018-00029",
"Impact": "High",
"Public": "20160126"
}
],
"CVEs": [
{
"ID": "CVE-2016-1930",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1930",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1931",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1931",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1933",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1933",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1935",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1935",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1937",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1937",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1939",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1939",
"Impact": "Low",
"Public": "20160131"
},
{
"ID": "CVE-2016-1942",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1942",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1944",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1944",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1945",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1945",
"Impact": "High",
"Public": "20160131"
},
{
"ID": "CVE-2016-1946",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1946",
"Impact": "Critical",
"Public": "20160131"
},
{
"ID": "CVE-2016-1947",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
"CWE": "CWE-19",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1947",
"Impact": "Low",
"Public": "20160131"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161057001",
"Comment": "firefox is earlier than 0:44.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161057002",
"Comment": "rpm-build-firefox is earlier than 0:44.0-alt1"
}
]
}
]
}
}
]
}