2024-06-28 13:17:52 +00:00

210 lines
9.3 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20171249",
"Version": "oval:org.altlinux.errata:def:20171249",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-1249: package `thunderbird` update to version 45.8.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-1249",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1249",
"Source": "ALTPU"
},
{
"RefID": "CVE-2017-5400",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5400",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5401",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5401",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5402",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5402",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5404",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5404",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5405",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5405",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5408",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5410",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5410",
"Source": "CVE"
}
],
"Description": "This update upgrades thunderbird to version 45.8.0-alt1. \nSecurity Fix(es):\n\n * CVE-2017-5400: JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5401: A crash triggerable by web content in which an \"ErrorResult\" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5402: A use-after-free can occur when events are fired for a \"FontFace\" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5404: A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5405: Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5408: Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.\n\n * CVE-2017-5410: Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox \u003c 52, Firefox ESR \u003c 45.8, Thunderbird \u003c 52, and Thunderbird \u003c 45.8.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-03-07"
},
"Updated": {
"Date": "2017-03-07"
},
"BDUs": null,
"CVEs": [
{
"ID": "CVE-2017-5400",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5400",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5401",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-388",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5401",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5402",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5402",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5404",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5404",
"Impact": "Critical",
"Public": "20180611"
},
{
"ID": "CVE-2017-5405",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-1187",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5405",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5408",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5408",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-5410",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5410",
"Impact": "Critical",
"Public": "20180611"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20171249001",
"Comment": "rpm-build-thunderbird is earlier than 0:45.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171249002",
"Comment": "thunderbird is earlier than 0:45.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171249003",
"Comment": "thunderbird-devel is earlier than 0:45.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171249004",
"Comment": "thunderbird-enigmail is earlier than 0:45.8.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20171249005",
"Comment": "thunderbird-google-calendar is earlier than 0:45.8.0-alt1"
}
]
}
]
}
}
]
}