vuln-list-alt/oval/p10/ALT-PU-2023-1435/definitions.json
2024-04-16 14:26:14 +00:00

442 lines
24 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20231435",
"Version": "oval:org.altlinux.errata:def:20231435",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-1435: package `firefox-esr` update to version 102.8.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-1435",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-1435",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-01262",
"RefURL": "https://bdu.fstec.ru/vul/2023-01262",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01263",
"RefURL": "https://bdu.fstec.ru/vul/2023-01263",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01264",
"RefURL": "https://bdu.fstec.ru/vul/2023-01264",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01265",
"RefURL": "https://bdu.fstec.ru/vul/2023-01265",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01266",
"RefURL": "https://bdu.fstec.ru/vul/2023-01266",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01267",
"RefURL": "https://bdu.fstec.ru/vul/2023-01267",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01268",
"RefURL": "https://bdu.fstec.ru/vul/2023-01268",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01269",
"RefURL": "https://bdu.fstec.ru/vul/2023-01269",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01270",
"RefURL": "https://bdu.fstec.ru/vul/2023-01270",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01271",
"RefURL": "https://bdu.fstec.ru/vul/2023-01271",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01272",
"RefURL": "https://bdu.fstec.ru/vul/2023-01272",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01963",
"RefURL": "https://bdu.fstec.ru/vul/2023-01963",
"Source": "BDU"
},
{
"RefID": "CVE-2023-0767",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-0767",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25728",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25729",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25730",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25732",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25734",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25735",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25737",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25738",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25739",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25742",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25742",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25744",
"Source": "CVE"
},
{
"RefID": "CVE-2023-25746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-25746",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox-esr to version 102.8.0-alt1. \nSecurity Fix(es):\n\n * BDU:2023-01262: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе\n\n * BDU:2023-01263: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками при импорте открытого ключа SPKI RSA в качестве ECDSA P-256, позволяющая нарушителю привести к сбою вкладки\n\n * BDU:2023-01264: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с недопустимым понижение из nsTextNode в SVGElement, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01265: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением отображаемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю получить доступ к конфиденциальной информации\n\n * BDU:2023-01266: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после ее освобождения, позволяющая нарушителю хранить объекты из других разделов в основном разделе\n\n * BDU:2023-01267: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с тем, что при кодировании данных из \u0026quot;InputStream\u0026quot; в \u0026quot;xpcom\u0026quot; размер кодируемых входных данных будет неправильно рассчитан, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-01268: Уязвимость браузеров Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с копирование в буфер без проверки размера входных данных, позволяющая нарушителю выполнять произвольный код в целевой системе\n\n * BDU:2023-01269: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с использованием памяти после освобождения, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-01270: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильным ограничением операций в пределах буфера памяти, позволяющая нарушителю запустить произвольную запись в память\n\n * BDU:2023-01271: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с неправильной нейтрализаций закодированных схем URI на веб-странице, позволяющая нарушителю загрузить файлы или взаимодействовать с программным обеспечением, уже установленным в системе\n\n * BDU:2023-01272: Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR, почтового клиента Mozilla Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю принудительно перевести браузер в полноэкранный режим\n\n * BDU:2023-01963: Уязвимость функций печати браузеров Firefox, Firefox ESR и почтового клиента Thunderbird операционных систем Windows, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2023-0767: An attacker could construct a PKCS 12 cert bundle in such a way that could allow for arbitrary memory writes via PKCS 12 Safe Bag attributes being mishandled. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25728: The \u003ccode\u003eContent-Security-Policy-Report-Only\u003c/code\u003e header could allow an attacker to leak a child iframe's unredacted URI when interaction with that iframe triggers a redirect. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25729: Permission prompts for opening external schemes were only shown for \u003ccode\u003eContentPrincipals\u003c/code\u003e resulting in extensions being able to open them without user interaction via \u003ccode\u003eExpandedPrincipals\u003c/code\u003e. This could lead to further malicious actions such as downloading files or interacting with software already installed on the system. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25730: A background script invoking \u003ccode\u003erequestFullscreen\u003c/code\u003e and then blocking the main thread could force the browser into fullscreen mode indefinitely, resulting in potential user confusion or spoofing attacks. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25732: When encoding data from an \u003ccode\u003einputStream\u003c/code\u003e in \u003ccode\u003expcom\u003c/code\u003e the size of the input being encoded was not correctly calculated potentially leading to an out of bounds memory write. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25734: After downloading a Windows \u003ccode\u003e.url\u003c/code\u003e shortcut from the local filesystem, an attacker could supply a remote path that would lead to unexpected network requests from the operating system. This also had the potential to leak NTLM credentials to the resource.\u003cbr\u003e*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25735: Cross-compartment wrappers wrapping a scripted proxy could have caused objects from other compartments to be stored in the main compartment resulting in a use-after-free after unwrapping the proxy. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25737: An invalid downcast from \u003ccode\u003ensTextNode\u003c/code\u003e to \u003ccode\u003eSVGElement\u003c/code\u003e could have lead to undefined behavior. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25738: Members of the \u003ccode\u003eDEVMODEW\u003c/code\u003e struct set by the printer device driver weren't being validated and could have resulted in invalid values which in turn would cause the browser to attempt out of bounds access to related variables.\u003cbr\u003e*This bug only affects Firefox on Windows. Other operating systems are unaffected.*. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25739: Module load requests that failed were not being checked as to whether or not they were cancelled causing a use-after-free in \u003ccode\u003eScriptLoadContext\u003c/code\u003e. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25742: When importing a SPKI RSA public key as ECDSA P-256, the key would be handled incorrectly causing the tab to crash. This vulnerability affects Firefox \u003c 110, Thunderbird \u003c 102.8, and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25744: Mmemory safety bugs present in Firefox 109 and Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox \u003c 110 and Firefox ESR \u003c 102.8.\n\n * CVE-2023-25746: Memory safety bugs present in Firefox ESR 102.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird \u003c 102.8 and Firefox ESR \u003c 102.8.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-03-15"
},
"Updated": {
"Date": "2023-03-15"
},
"BDUs": [
{
"ID": "BDU:2023-01262",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2023-01262",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01263",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-173",
"Href": "https://bdu.fstec.ru/vul/2023-01263",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01264",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2023-01264",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01265",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-1021",
"Href": "https://bdu.fstec.ru/vul/2023-01265",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01266",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01266",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01267",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-01267",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01268",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2023-01268",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01269",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-01269",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01270",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2023-01270",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01271",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-84",
"Href": "https://bdu.fstec.ru/vul/2023-01271",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01272",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-451",
"Href": "https://bdu.fstec.ru/vul/2023-01272",
"Impact": "High",
"Public": "20230215"
},
{
"ID": "BDU:2023-01963",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119, CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-01963",
"Impact": "High",
"Public": "20230214"
}
],
"CVEs": [
{
"ID": "CVE-2023-0767",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-0767",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25728",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25728",
"Impact": "Low",
"Public": "20230602"
},
{
"ID": "CVE-2023-25729",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25729",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25730",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25730",
"Impact": "Low",
"Public": "20230602"
},
{
"ID": "CVE-2023-25732",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25732",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25734",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25734",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25735",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25735",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25737",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25737",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25738",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25738",
"Impact": "Low",
"Public": "20230602"
},
{
"ID": "CVE-2023-25739",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25739",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25742",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25742",
"Impact": "Low",
"Public": "20230602"
},
{
"ID": "CVE-2023-25744",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25744",
"Impact": "High",
"Public": "20230602"
},
{
"ID": "CVE-2023-25746",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-25746",
"Impact": "High",
"Public": "20230602"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20231435001",
"Comment": "firefox-esr is earlier than 0:102.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231435002",
"Comment": "firefox-esr-config-privacy is earlier than 0:102.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20231435003",
"Comment": "firefox-esr-wayland is earlier than 0:102.8.0-alt1"
}
]
}
]
}
}
]
}