2024-12-12 21:07:30 +00:00

1000 lines
50 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191257",
"Version": "oval:org.altlinux.errata:def:20191257",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1257: package `chromium` update to version 72.0.3626.81-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1257",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1257",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-00904",
"RefURL": "https://bdu.fstec.ru/vul/2019-00904",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00905",
"RefURL": "https://bdu.fstec.ru/vul/2019-00905",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00906",
"RefURL": "https://bdu.fstec.ru/vul/2019-00906",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00907",
"RefURL": "https://bdu.fstec.ru/vul/2019-00907",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00908",
"RefURL": "https://bdu.fstec.ru/vul/2019-00908",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00909",
"RefURL": "https://bdu.fstec.ru/vul/2019-00909",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00910",
"RefURL": "https://bdu.fstec.ru/vul/2019-00910",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00911",
"RefURL": "https://bdu.fstec.ru/vul/2019-00911",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00912",
"RefURL": "https://bdu.fstec.ru/vul/2019-00912",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00913",
"RefURL": "https://bdu.fstec.ru/vul/2019-00913",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00914",
"RefURL": "https://bdu.fstec.ru/vul/2019-00914",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00915",
"RefURL": "https://bdu.fstec.ru/vul/2019-00915",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00916",
"RefURL": "https://bdu.fstec.ru/vul/2019-00916",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00917",
"RefURL": "https://bdu.fstec.ru/vul/2019-00917",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00918",
"RefURL": "https://bdu.fstec.ru/vul/2019-00918",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00955",
"RefURL": "https://bdu.fstec.ru/vul/2019-00955",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00956",
"RefURL": "https://bdu.fstec.ru/vul/2019-00956",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00957",
"RefURL": "https://bdu.fstec.ru/vul/2019-00957",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00958",
"RefURL": "https://bdu.fstec.ru/vul/2019-00958",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01049",
"RefURL": "https://bdu.fstec.ru/vul/2019-01049",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01050",
"RefURL": "https://bdu.fstec.ru/vul/2019-01050",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01051",
"RefURL": "https://bdu.fstec.ru/vul/2019-01051",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01162",
"RefURL": "https://bdu.fstec.ru/vul/2019-01162",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01308",
"RefURL": "https://bdu.fstec.ru/vul/2019-01308",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01309",
"RefURL": "https://bdu.fstec.ru/vul/2019-01309",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01310",
"RefURL": "https://bdu.fstec.ru/vul/2019-01310",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01311",
"RefURL": "https://bdu.fstec.ru/vul/2019-01311",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01312",
"RefURL": "https://bdu.fstec.ru/vul/2019-01312",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01313",
"RefURL": "https://bdu.fstec.ru/vul/2019-01313",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01314",
"RefURL": "https://bdu.fstec.ru/vul/2019-01314",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01571",
"RefURL": "https://bdu.fstec.ru/vul/2019-01571",
"Source": "BDU"
},
{
"RefID": "CVE-2018-20073",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20073",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13684",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13684",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13768",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13768",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5754",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5755",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5756",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5757",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5758",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5759",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5759",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5760",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5760",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5761",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5761",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5762",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5763",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5764",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5765",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5765",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5766",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5766",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5767",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5768",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5768",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5769",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5769",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5770",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5770",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5771",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5771",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5772",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5772",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5773",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5773",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5774",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5774",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5775",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5775",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5776",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5776",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5777",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5777",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5778",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5778",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5779",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5779",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5780",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5780",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5781",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5781",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5782",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5782",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5783",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5783",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5785",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5785",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 72.0.3626.81-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00904: Уязвимость модуля отображения Blink веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00905: Уязвимость набора инструментов DevTools веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-00906: Уязвимость пользовательского интерфейса в WebAPK веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-00907: Уязвимость механизма проверки происхождения источника для Canvas веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-00908: Уязвимость компонента для отображения веб-страниц WebView и браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-00909: Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00910: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00911: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00912: Уязвимость реализации технологии WebRTC веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00913: Уязвимость веб-браузера Google Chrome, связанная с ошибками при обработке жизненного цикла элементов HTML select, позволяющая нарушителю выйти из изолированной программной среды браузера\n\n * BDU:2019-00914: Уязвимость модуля отображения Blink веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00915: Уязвимость механизма обработки SVG-объектов веб-браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00916: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00917: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-00918: Уязвимость веб-браузера Google Chrome, связанная с ошибками реализации сетевого протокола QUIC, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2019-00955: Уязвимость компонента Omnibox веб-браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2019-00956: Уязвимость компонента Omnibox веб-браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2019-00957: Уязвимость компонента Omnibox веб-браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2019-00958: Уязвимость компонента Omnibox веб-браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки\n\n * BDU:2019-01049: Уязвимость компонента WebGL веб-браузера Chrome, позволяющая нарушителю переписывать произвольные файлы в целевом каталоге\n\n * BDU:2019-01050: Уязвимость компонента SwiftShader веб-браузера Chrome, позволяющая нарушителю получить несанкционированный доступ к данным\n\n * BDU:2019-01051: Уязвимость компонента IndexedDB веб-браузера Chrome, позволяющая нарушителю получить несанкционированный доступ к данным\n\n * BDU:2019-01162: Уязвимость библиотеки SwiftShader веб-браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-01308: Уязвимость механизма рендеринга PDFium браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю оказать воздействие на целостность защищаемой информации\n\n * BDU:2019-01309: Уязвимость браузера Google Chrome, связанная с некорректной проверкой ввода данных, позволяющая нарушителю загрузить .desktop файл для выполнения произвольного кода\n\n * BDU:2019-01310: Уязвимость браузера Google Chrome, связанная с некорректной нейтрализацией ввода при генерации веб-страницы, позволяющая нарушителю обойти существующие ограничения доступа для привилегированных страниц\n\n * BDU:2019-01311: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой политик Service Worker, позволяющая нарушителю обойти ограничения навигации\n\n * BDU:2019-01312: Уязвимость браузера Google Chrome, связанная с некорректной проверкой ввода данных, позволяющая нарушителю выполнить произвольный JavaScript-код\n\n * BDU:2019-01313: Уязвимость браузера Google Chrome, связанная с некорректной проверкой ввода данных, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-01314: Уязвимость компонента DevTools браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных\n\n * BDU:2019-01571: Уязвимость библиотеки Skia используемой веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2018-20073: Use of extended attributes in downloads in Google Chrome prior to 72.0.3626.81 allowed a local attacker to read download URLs via the filesystem.\n\n * CVE-2019-13684: Inappropriate implementation in JavaScript in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13768: Use after free in FileAPI in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page. (Chrome security severity: High)\n\n * CVE-2019-5754: Implementation error in QUIC Networking in Google Chrome prior to 72.0.3626.81 allowed an attacker running or able to cause use of a proxy server to obtain cleartext of transport encryption via malicious network proxy.\n\n * CVE-2019-5755: Incorrect handling of negative zero in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page.\n\n * CVE-2019-5756: Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.\n\n * CVE-2019-5757: An incorrect object type assumption in SVG in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.\n\n * CVE-2019-5758: Incorrect object lifecycle management in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5759: Incorrect lifetime handling in HTML select elements in Google Chrome on Android and Mac prior to 72.0.3626.81 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2019-5760: Insufficient checks of pointer validity in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5761: Incorrect object lifecycle management in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5762: Inappropriate memory management when caching in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.\n\n * CVE-2019-5763: Failure to check error conditions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5764: Incorrect pointer management in WebRTC in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5765: An exposed debugging endpoint in the browser in Google Chrome on Android prior to 72.0.3626.81 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted Intent.\n\n * CVE-2019-5766: Incorrect handling of origin taint checking in Canvas in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-5767: Insufficient protection of permission UI in WebAPKs in Google Chrome on Android prior to 72.0.3626.81 allowed an attacker who convinced the user to install a malicious application to access privacy/security sensitive web APIs via a crafted APK.\n\n * CVE-2019-5768: DevTools API not correctly gating on extension capability in DevTools in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to read local files via a crafted Chrome Extension.\n\n * CVE-2019-5769: Incorrect handling of invalid end character position when front rendering in Blink in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5770: Insufficient input validation in WebGL in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2019-5771: An incorrect JIT of GLSL shaders in SwiftShader in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-5772: Sharing of objects over calls into JavaScript runtime in PDFium in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-5773: Insufficient origin validation in IndexedDB in Google Chrome prior to 72.0.3626.81 allowed a remote attacker who had compromised the renderer process to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-5774: Omission of the .desktop filetype from the Safe Browsing checklist in SafeBrowsing in Google Chrome on Linux prior to 72.0.3626.81 allowed an attacker who convinced a user to download a .desktop file to execute arbitrary code via a downloaded .desktop file.\n\n * CVE-2019-5775: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-5776: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-5777: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-5778: A missing case for handling special schemes in permission request checks in Extensions in Google Chrome prior to 72.0.3626.81 allowed an attacker who convinced a user to install a malicious extension to bypass extension permission checks for privileged pages via a crafted Chrome Extension.\n\n * CVE-2019-5779: Insufficient policy validation in ServiceWorker in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-5780: Insufficient restrictions on what can be done with Apple Events in Google Chrome on macOS prior to 72.0.3626.81 allowed a local attacker to execute JavaScript via Apple Events.\n\n * CVE-2019-5781: Incorrect handling of a confusable character in Omnibox in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-5782: Incorrect optimization assumptions in V8 in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-5783: Missing URI encoding of untrusted input in DevTools in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform a Dangling Markup Injection attack via a crafted HTML page.\n\n * CVE-2019-5785: Incorrect convexity calculations in Skia in Google Chrome prior to 72.0.3626.81 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-02-17"
},
"Updated": {
"Date": "2019-02-17"
},
"BDUs": [
{
"ID": "BDU:2019-00904",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00904",
"Impact": "High",
"Public": "20181211"
},
{
"ID": "BDU:2019-00905",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2019-00905",
"Impact": "Low",
"Public": "20180124"
},
{
"ID": "BDU:2019-00906",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-275",
"Href": "https://bdu.fstec.ru/vul/2019-00906",
"Impact": "Low",
"Public": "20181106"
},
{
"ID": "BDU:2019-00907",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-00907",
"Impact": "Low",
"Public": "20181120"
},
{
"ID": "BDU:2019-00908",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-00908",
"Impact": "Low",
"Public": "20190116"
},
{
"ID": "BDU:2019-00909",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00909",
"Impact": "High",
"Public": "20181209"
},
{
"ID": "BDU:2019-00910",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00910",
"Impact": "High",
"Public": "20181213"
},
{
"ID": "BDU:2019-00911",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-00911",
"Impact": "High",
"Public": "20181031"
},
{
"ID": "BDU:2019-00912",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00912",
"Impact": "High",
"Public": "20181205"
},
{
"ID": "BDU:2019-00913",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00913",
"Impact": "Critical",
"Public": "20181205"
},
{
"ID": "BDU:2019-00914",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00914",
"Impact": "High",
"Public": "20181211"
},
{
"ID": "BDU:2019-00915",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-00915",
"Impact": "High",
"Public": "20181215"
},
{
"ID": "BDU:2019-00916",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-00916",
"Impact": "High",
"Public": "20181014"
},
{
"ID": "BDU:2019-00917",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-189",
"Href": "https://bdu.fstec.ru/vul/2019-00917",
"Impact": "High",
"Public": "20181210"
},
{
"ID": "BDU:2019-00918",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2019-00918",
"Impact": "Low",
"Public": "20181212"
},
{
"ID": "BDU:2019-00955",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00955",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-00956",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00956",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-00957",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00957",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-00958",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-00958",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-01049",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01049",
"Impact": "Low",
"Public": "20181127"
},
{
"ID": "BDU:2019-01050",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-01050",
"Impact": "Low",
"Public": "20181112"
},
{
"ID": "BDU:2019-01051",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20, CWE-115",
"Href": "https://bdu.fstec.ru/vul/2019-01051",
"Impact": "Low",
"Public": "20181224"
},
{
"ID": "BDU:2019-01162",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01162",
"Impact": "High",
"Public": "20181113"
},
{
"ID": "BDU:2019-01308",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01308",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "BDU:2019-01309",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-01309",
"Impact": "High",
"Public": "20190130"
},
{
"ID": "BDU:2019-01310",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2019-01310",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-01311",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-01311",
"Impact": "Low",
"Public": "20190130"
},
{
"ID": "BDU:2019-01312",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-01312",
"Impact": "High",
"Public": "20190130"
},
{
"ID": "BDU:2019-01313",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-01313",
"Impact": "High",
"Public": "20190130"
},
{
"ID": "BDU:2019-01314",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-74",
"Href": "https://bdu.fstec.ru/vul/2019-01314",
"Impact": "High",
"Public": "20190130"
},
{
"ID": "BDU:2019-01571",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-01571",
"Impact": "Low",
"Public": "20190212"
}
],
"CVEs": [
{
"ID": "CVE-2018-20073",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20073",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2019-13684",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-203",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13684",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "CVE-2019-13768",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13768",
"Impact": "High",
"Public": "20230102"
},
{
"ID": "CVE-2019-5754",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-327",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5754",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5755",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-189",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5755",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5756",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5756",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5757",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5757",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5758",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5758",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5759",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5759",
"Impact": "Critical",
"Public": "20190219"
},
{
"ID": "CVE-2019-5760",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5760",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5761",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5761",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5762",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5762",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5763",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-754",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5763",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5764",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5765",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-312",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5765",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5766",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5766",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5767",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5767",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5768",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5768",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5769",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5769",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5770",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5770",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5771",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5771",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5772",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5772",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5773",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5773",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5774",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5774",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5775",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5775",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5776",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5776",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5777",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5777",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5778",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5778",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5779",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5779",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5780",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5780",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5781",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5781",
"Impact": "Low",
"Public": "20190219"
},
{
"ID": "CVE-2019-5782",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5782",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5783",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5783",
"Impact": "High",
"Public": "20190219"
},
{
"ID": "CVE-2019-5785",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5785",
"Impact": "Low",
"Public": "20190627"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191257001",
"Comment": "chromium is earlier than 0:72.0.3626.81-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191257002",
"Comment": "chromium-gnome is earlier than 0:72.0.3626.81-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191257003",
"Comment": "chromium-kde is earlier than 0:72.0.3626.81-alt1"
}
]
}
]
}
}
]
}