270 lines
12 KiB
JSON
270 lines
12 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161098",
|
|
"Version": "oval:org.altlinux.errata:def:20161098",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1098: package `chromium` update to version 48.0.2564.109-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1098",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1098",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00453",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00453",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00529",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00529",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00530",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00530",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00531",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00531",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00532",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00532",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00533",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00533",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-00534",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-00534",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1622",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1622",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1623",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1623",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1624",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1624",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1625",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1625",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1626",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1627",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1627",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-1628",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 48.0.2564.109-alt1. \nSecurity Fix(es):\n\n * BDU:2016-00453: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2016-00529: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-00530: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения доступа\n\n * BDU:2016-00531: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти ограничения доступа\n\n * BDU:2016-00532: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-00533: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2016-00534: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * CVE-2016-1622: The Extensions subsystem in Google Chrome before 48.0.2564.109 does not prevent use of the Object.defineProperty method to override intended extension behavior, which allows remote attackers to bypass the Same Origin Policy via crafted JavaScript code.\n\n * CVE-2016-1623: The DOM implementation in Google Chrome before 48.0.2564.109 does not properly restrict frame-attach operations from occurring during or after frame-detach operations, which allows remote attackers to bypass the Same Origin Policy via a crafted web site, related to FrameLoader.cpp, HTMLFrameOwnerElement.h, LocalFrame.cpp, and WebLocalFrameImpl.cpp.\n\n * CVE-2016-1624: Integer underflow in the ProcessCommandsInternal function in dec/decode.c in Brotli, as used in Google Chrome before 48.0.2564.109, allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via crafted data with brotli compression.\n\n * CVE-2016-1625: The Chrome Instant feature in Google Chrome before 48.0.2564.109 does not ensure that a New Tab Page (NTP) navigation target is on the most-visited or suggestions list, which allows remote attackers to bypass intended restrictions via unspecified vectors, related to instant_service.cc and search_tab_helper.cc.\n\n * CVE-2016-1626: The opj_pi_update_decode_poc function in pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, miscalculates a certain layer index value, which allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted PDF document.\n\n * CVE-2016-1627: The Developer Tools (aka DevTools) subsystem in Google Chrome before 48.0.2564.109 does not validate URL schemes and ensure that the remoteBase parameter is associated with a chrome-devtools-frontend.appspot.com URL, which allows remote attackers to bypass intended access restrictions via a crafted URL, related to browser/devtools/devtools_ui_bindings.cc and WebKit/Source/devtools/front_end/Runtime.js.\n\n * CVE-2016-1628: pi.c in OpenJPEG, as used in PDFium in Google Chrome before 48.0.2564.109, does not validate a certain precision value, which allows remote attackers to execute arbitrary code or cause a denial of service (out-of-bounds read) via a crafted JPEG 2000 image in a PDF document, related to the opj_pi_next_rpcl, opj_pi_next_pcrl, and opj_pi_next_cprl functions.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-02-12"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-02-12"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-00453",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00453",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00529",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00529",
|
|
"Impact": "Low",
|
|
"Public": "20160221"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00530",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00530",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00531",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00531",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00532",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00532",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00533",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00533",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-00534",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-00534",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2016-1622",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1622",
|
|
"Impact": "High",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1623",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1623",
|
|
"Impact": "High",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1624",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1624",
|
|
"Impact": "High",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1625",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1625",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1626",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1626",
|
|
"Impact": "Low",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1627",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1627",
|
|
"Impact": "High",
|
|
"Public": "20160214"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-1628",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-1628",
|
|
"Impact": "Low",
|
|
"Public": "20160221"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161098001",
|
|
"Comment": "chromium is earlier than 0:48.0.2564.109-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161098002",
|
|
"Comment": "chromium-gnome is earlier than 0:48.0.2564.109-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161098003",
|
|
"Comment": "chromium-kde is earlier than 0:48.0.2564.109-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |