2024-06-29 09:05:10 +00:00

856 lines
42 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151667",
"Version": "oval:org.altlinux.errata:def:20151667",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1667: package `firefox` update to version 39.0.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1667",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1667",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-10550",
"RefURL": "https://bdu.fstec.ru/vul/2015-10550",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10551",
"RefURL": "https://bdu.fstec.ru/vul/2015-10551",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10552",
"RefURL": "https://bdu.fstec.ru/vul/2015-10552",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10553",
"RefURL": "https://bdu.fstec.ru/vul/2015-10553",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10554",
"RefURL": "https://bdu.fstec.ru/vul/2015-10554",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10555",
"RefURL": "https://bdu.fstec.ru/vul/2015-10555",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10556",
"RefURL": "https://bdu.fstec.ru/vul/2015-10556",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10557",
"RefURL": "https://bdu.fstec.ru/vul/2015-10557",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10558",
"RefURL": "https://bdu.fstec.ru/vul/2015-10558",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10559",
"RefURL": "https://bdu.fstec.ru/vul/2015-10559",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10560",
"RefURL": "https://bdu.fstec.ru/vul/2015-10560",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10561",
"RefURL": "https://bdu.fstec.ru/vul/2015-10561",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10562",
"RefURL": "https://bdu.fstec.ru/vul/2015-10562",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10563",
"RefURL": "https://bdu.fstec.ru/vul/2015-10563",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10564",
"RefURL": "https://bdu.fstec.ru/vul/2015-10564",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10565",
"RefURL": "https://bdu.fstec.ru/vul/2015-10565",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10566",
"RefURL": "https://bdu.fstec.ru/vul/2015-10566",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10567",
"RefURL": "https://bdu.fstec.ru/vul/2015-10567",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10568",
"RefURL": "https://bdu.fstec.ru/vul/2015-10568",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10569",
"RefURL": "https://bdu.fstec.ru/vul/2015-10569",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10570",
"RefURL": "https://bdu.fstec.ru/vul/2015-10570",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10571",
"RefURL": "https://bdu.fstec.ru/vul/2015-10571",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10572",
"RefURL": "https://bdu.fstec.ru/vul/2015-10572",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10573",
"RefURL": "https://bdu.fstec.ru/vul/2015-10573",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10574",
"RefURL": "https://bdu.fstec.ru/vul/2015-10574",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10575",
"RefURL": "https://bdu.fstec.ru/vul/2015-10575",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10576",
"RefURL": "https://bdu.fstec.ru/vul/2015-10576",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10577",
"RefURL": "https://bdu.fstec.ru/vul/2015-10577",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10578",
"RefURL": "https://bdu.fstec.ru/vul/2015-10578",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10810",
"RefURL": "https://bdu.fstec.ru/vul/2015-10810",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10811",
"RefURL": "https://bdu.fstec.ru/vul/2015-10811",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10812",
"RefURL": "https://bdu.fstec.ru/vul/2015-10812",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10813",
"RefURL": "https://bdu.fstec.ru/vul/2015-10813",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10814",
"RefURL": "https://bdu.fstec.ru/vul/2015-10814",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10815",
"RefURL": "https://bdu.fstec.ru/vul/2015-10815",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10816",
"RefURL": "https://bdu.fstec.ru/vul/2015-10816",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10817",
"RefURL": "https://bdu.fstec.ru/vul/2015-10817",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10818",
"RefURL": "https://bdu.fstec.ru/vul/2015-10818",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10819",
"RefURL": "https://bdu.fstec.ru/vul/2015-10819",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11248",
"RefURL": "https://bdu.fstec.ru/vul/2015-11248",
"Source": "BDU"
},
{
"RefID": "CVE-2015-2722",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2722",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2724",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2725",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2726",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2728",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2729",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2731",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2731",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2733",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2734",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2735",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2736",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2737",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2738",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2739",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2740",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2741",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2741",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2743",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4495",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4495",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 39.0.3-alt1. \nSecurity Fix(es):\n\n * BDU:2015-10550: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10551: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10552: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10553: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10554: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10555: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10556: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10557: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10558: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10559: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10560: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10561: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10562: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10563: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10564: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10565: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10566: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10567: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10568: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10569: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10570: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10571: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10572: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10573: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10574: Уязвимость браузера Firefox ESR, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10575: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10576: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10577: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10578: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10810: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-10811: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-10812: Уязвимость браузера Firefox, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10813: Уязвимость браузера Firefox ESR, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10814: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10815: Уязвимость браузера Firefox, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10816: Уязвимость браузера Firefox ESR, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10817: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10818: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10819: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11248: Уязвимость операционной системы Firefox OS, браузеров Firefox и Firefox ESR, позволяющая нарушителю обойти политику разграничения доступа, читать произвольные файлы и повысить свои привилегии\n\n * CVE-2015-2722: Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.\n\n * CVE-2015-2724: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2725: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2726: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2728: The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a \"type confusion\" issue.\n\n * CVE-2015-2729: The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.\n\n * CVE-2015-2731: Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.\n\n * CVE-2015-2733: Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.\n\n * CVE-2015-2734: The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2735: nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.\n\n * CVE-2015-2736: The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.\n\n * CVE-2015-2737: The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2738: The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2739: The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2740: Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.\n\n * CVE-2015-2741: Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.\n\n * CVE-2015-2743: PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.\n\n * CVE-2015-4495: The PDF reader in Mozilla Firefox before 39.0.3, Firefox ESR 38.x before 38.1.1, and Firefox OS before 2.2 allows remote attackers to bypass the Same Origin Policy, and read arbitrary files or gain privileges, via vectors involving crafted JavaScript code and a native setter, as exploited in the wild in August 2015.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-08-10"
},
"Updated": {
"Date": "2015-08-10"
},
"BDUs": [
{
"ID": "BDU:2015-10550",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10550",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10551",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10551",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10552",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10552",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10553",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10553",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10554",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10554",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10555",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10555",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10556",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10556",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10557",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10557",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10558",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10558",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10559",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10559",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10560",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10560",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10561",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10561",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10562",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10562",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10563",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10563",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10564",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10564",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10565",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10565",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10566",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10566",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10567",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10567",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10568",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10568",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10569",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10569",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10570",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10570",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10571",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10571",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10572",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10572",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10573",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10573",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10574",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10574",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10575",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10575",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10576",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10576",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10577",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10577",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10578",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10578",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10810",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2015-10810",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10811",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2015-10811",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10812",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10812",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10813",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10813",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10814",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10814",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10815",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10815",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10816",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10816",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10817",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10817",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10818",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10818",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10819",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10819",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-11248",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2015-11248",
"Impact": "Low",
"Public": "20150806"
}
],
"CVEs": [
{
"ID": "CVE-2015-2722",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2722",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2724",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2724",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2725",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2725",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2726",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2726",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2728",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2728",
"Impact": "High",
"Public": "20150706"
},
{
"ID": "CVE-2015-2729",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2729",
"Impact": "Low",
"Public": "20150706"
},
{
"ID": "CVE-2015-2731",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2731",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2733",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2733",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2734",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2734",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2735",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2735",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2736",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2736",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2737",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2737",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2738",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2738",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2739",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2739",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2740",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2740",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2741",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2741",
"Impact": "Low",
"Public": "20150706"
},
{
"ID": "CVE-2015-2743",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2743",
"Impact": "High",
"Public": "20150706"
},
{
"ID": "CVE-2015-4495",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4495",
"Impact": "High",
"Public": "20150808"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:kworkstation:10.1",
"cpe:/o:alt:workstation:10.1",
"cpe:/o:alt:server:10.1",
"cpe:/o:alt:server-v:10.1",
"cpe:/o:alt:education:10.1",
"cpe:/o:alt:slinux:10.1",
"cpe:/o:alt:starterkit:10.1",
"cpe:/o:alt:kworkstation:10.2",
"cpe:/o:alt:workstation:10.2",
"cpe:/o:alt:server:10.2",
"cpe:/o:alt:server-v:10.2",
"cpe:/o:alt:education:10.2",
"cpe:/o:alt:slinux:10.2",
"cpe:/o:alt:starterkit:10.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151667001",
"Comment": "firefox is earlier than 0:39.0.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20151667002",
"Comment": "rpm-build-firefox is earlier than 0:39.0.3-alt1"
}
]
}
]
}
}
]
}