364 lines
18 KiB
JSON
364 lines
18 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20142044",
|
|
"Version": "oval:org.altlinux.errata:def:20142044",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2014-2044: package `chromium` update to version 37.0.2062.94-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2014-2044",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-2044",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00192",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00192",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00194",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00194",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00195",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00195",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00202",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00202",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00236",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00236",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00237",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00237",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00238",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00238",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00239",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00239",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00240",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00240",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00242",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00242",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3168",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3168",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3169",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3169",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3170",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3170",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3171",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3171",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3172",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3172",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3173",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3173",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3174",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3174",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3175",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3175",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3176",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3176",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-3177",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-3177",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 37.0.2062.94-alt1. \nSecurity Fix(es):\n\n * BDU:2015-00192: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00194: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00195: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00202: Уязвимости браузера Google Chrome, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00236: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации\n\n * BDU:2015-00237: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность и целостность защищаемой информации\n\n * BDU:2015-00238: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00239: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-00240: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * BDU:2015-00242: Уязвимость браузера Google Chrome, позволяющая удаленному злоумышленнику нарушить доступность защищаемой информации\n\n * CVE-2014-3168: Use-after-free vulnerability in the SVG implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper caching associated with animation.\n\n * CVE-2014-3169: Use-after-free vulnerability in core/dom/ContainerNode.cpp in the DOM implementation in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging script execution that occurs before notification of node removal.\n\n * CVE-2014-3170: extensions/common/url_pattern.cc in Google Chrome before 37.0.2062.94 does not prevent use of a '\\0' character in a host name, which allows remote attackers to spoof the extension permission dialog by relying on truncation after this character.\n\n * CVE-2014-3171: Use-after-free vulnerability in the V8 bindings in Blink, as used in Google Chrome before 37.0.2062.94, allows remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging improper use of HashMap add operations instead of HashMap set operations, related to bindings/core/v8/DOMWrapperMap.h and bindings/core/v8/SerializedScriptValue.cpp.\n\n * CVE-2014-3172: The Debugger extension API in browser/extensions/api/debugger/debugger_api.cc in Google Chrome before 37.0.2062.94 does not validate a tab's URL before an attach operation, which allows remote attackers to bypass intended access limitations via an extension that uses a restricted URL, as demonstrated by a chrome:// URL.\n\n * CVE-2014-3173: The WebGL implementation in Google Chrome before 37.0.2062.94 does not ensure that clear calls interact properly with the state of a draw buffer, which allows remote attackers to cause a denial of service (read of uninitialized memory) via a crafted CANVAS element, related to gpu/command_buffer/service/framebuffer_manager.cc and gpu/command_buffer/service/gles2_cmd_decoder.cc.\n\n * CVE-2014-3174: modules/webaudio/BiquadDSPKernel.cpp in the Web Audio API implementation in Blink, as used in Google Chrome before 37.0.2062.94, does not properly consider concurrent threads during attempts to update biquad filter coefficients, which allows remote attackers to cause a denial of service (read of uninitialized memory) via crafted API calls.\n\n * CVE-2014-3175: Multiple unspecified vulnerabilities in Google Chrome before 37.0.2062.94 allow attackers to cause a denial of service or possibly have other impact via unknown vectors, related to the load_truetype_glyph function in truetype/ttgload.c in FreeType and other functions in other components.\n\n * CVE-2014-3176: Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3177.\n\n * CVE-2014-3177: Google Chrome before 37.0.2062.94 does not properly handle the interaction of extensions, IPC, the sync API, and Google V8, which allows remote attackers to execute arbitrary code via unspecified vectors, a different vulnerability than CVE-2014-3176.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2014-08-29"
|
|
},
|
|
"Updated": {
|
|
"Date": "2014-08-29"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-00192",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00192",
|
|
"Impact": "High",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00194",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00194",
|
|
"Impact": "High",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00195",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00195",
|
|
"Impact": "High",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00202",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00202",
|
|
"Impact": "Critical",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00236",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00236",
|
|
"Impact": "Low",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00237",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00237",
|
|
"Impact": "Low",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00238",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00238",
|
|
"Impact": "Critical",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00239",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00239",
|
|
"Impact": "Critical",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00240",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00240",
|
|
"Impact": "Low",
|
|
"Public": "20140826"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00242",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00242",
|
|
"Impact": "Low",
|
|
"Public": "20140826"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2014-3168",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3168",
|
|
"Impact": "High",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3169",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3169",
|
|
"Impact": "High",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3170",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3170",
|
|
"Impact": "Low",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3171",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3171",
|
|
"Impact": "High",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3172",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3172",
|
|
"Impact": "Low",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3173",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3173",
|
|
"Impact": "Low",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3174",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3174",
|
|
"Impact": "Low",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3175",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3175",
|
|
"Impact": "Critical",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3176",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3176",
|
|
"Impact": "Critical",
|
|
"Public": "20140827"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-3177",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-3177",
|
|
"Impact": "Critical",
|
|
"Public": "20140827"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142044001",
|
|
"Comment": "chromium is earlier than 0:37.0.2062.94-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142044002",
|
|
"Comment": "chromium-gnome is earlier than 0:37.0.2062.94-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142044003",
|
|
"Comment": "chromium-kde is earlier than 0:37.0.2062.94-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |