2024-06-28 13:17:52 +00:00

855 lines
42 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20151669",
"Version": "oval:org.altlinux.errata:def:20151669",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2015-1669: package `firefox-esr` update to version 38.1.1-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2015-1669",
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1669",
"Source": "ALTPU"
},
{
"RefID": "BDU:2015-10550",
"RefURL": "https://bdu.fstec.ru/vul/2015-10550",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10551",
"RefURL": "https://bdu.fstec.ru/vul/2015-10551",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10552",
"RefURL": "https://bdu.fstec.ru/vul/2015-10552",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10553",
"RefURL": "https://bdu.fstec.ru/vul/2015-10553",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10554",
"RefURL": "https://bdu.fstec.ru/vul/2015-10554",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10555",
"RefURL": "https://bdu.fstec.ru/vul/2015-10555",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10556",
"RefURL": "https://bdu.fstec.ru/vul/2015-10556",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10557",
"RefURL": "https://bdu.fstec.ru/vul/2015-10557",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10558",
"RefURL": "https://bdu.fstec.ru/vul/2015-10558",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10559",
"RefURL": "https://bdu.fstec.ru/vul/2015-10559",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10560",
"RefURL": "https://bdu.fstec.ru/vul/2015-10560",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10561",
"RefURL": "https://bdu.fstec.ru/vul/2015-10561",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10562",
"RefURL": "https://bdu.fstec.ru/vul/2015-10562",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10563",
"RefURL": "https://bdu.fstec.ru/vul/2015-10563",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10564",
"RefURL": "https://bdu.fstec.ru/vul/2015-10564",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10565",
"RefURL": "https://bdu.fstec.ru/vul/2015-10565",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10566",
"RefURL": "https://bdu.fstec.ru/vul/2015-10566",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10567",
"RefURL": "https://bdu.fstec.ru/vul/2015-10567",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10568",
"RefURL": "https://bdu.fstec.ru/vul/2015-10568",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10569",
"RefURL": "https://bdu.fstec.ru/vul/2015-10569",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10570",
"RefURL": "https://bdu.fstec.ru/vul/2015-10570",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10571",
"RefURL": "https://bdu.fstec.ru/vul/2015-10571",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10572",
"RefURL": "https://bdu.fstec.ru/vul/2015-10572",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10573",
"RefURL": "https://bdu.fstec.ru/vul/2015-10573",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10574",
"RefURL": "https://bdu.fstec.ru/vul/2015-10574",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10575",
"RefURL": "https://bdu.fstec.ru/vul/2015-10575",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10576",
"RefURL": "https://bdu.fstec.ru/vul/2015-10576",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10577",
"RefURL": "https://bdu.fstec.ru/vul/2015-10577",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10578",
"RefURL": "https://bdu.fstec.ru/vul/2015-10578",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10810",
"RefURL": "https://bdu.fstec.ru/vul/2015-10810",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10811",
"RefURL": "https://bdu.fstec.ru/vul/2015-10811",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10812",
"RefURL": "https://bdu.fstec.ru/vul/2015-10812",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10813",
"RefURL": "https://bdu.fstec.ru/vul/2015-10813",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10814",
"RefURL": "https://bdu.fstec.ru/vul/2015-10814",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10815",
"RefURL": "https://bdu.fstec.ru/vul/2015-10815",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10816",
"RefURL": "https://bdu.fstec.ru/vul/2015-10816",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10817",
"RefURL": "https://bdu.fstec.ru/vul/2015-10817",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10818",
"RefURL": "https://bdu.fstec.ru/vul/2015-10818",
"Source": "BDU"
},
{
"RefID": "BDU:2015-10819",
"RefURL": "https://bdu.fstec.ru/vul/2015-10819",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11042",
"RefURL": "https://bdu.fstec.ru/vul/2015-11042",
"Source": "BDU"
},
{
"RefID": "BDU:2015-11311",
"RefURL": "https://bdu.fstec.ru/vul/2015-11311",
"Source": "BDU"
},
{
"RefID": "CVE-2015-2722",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2722",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2724",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2724",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2725",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2726",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2728",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2729",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2731",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2731",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2733",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2734",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2735",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2736",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2737",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2738",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2739",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2740",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2741",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2741",
"Source": "CVE"
},
{
"RefID": "CVE-2015-2743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2743",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4000",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000",
"Source": "CVE"
},
{
"RefID": "CVE-2015-4497",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-4497",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox-esr to version 38.1.1-alt1. \nSecurity Fix(es):\n\n * BDU:2015-10550: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10551: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10552: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10553: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10554: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10555: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10556: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10557: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10558: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2015-10559: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10560: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10561: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код на стороне клиента\n\n * BDU:2015-10562: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10563: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10564: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10565: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10566: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10567: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10568: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10569: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10570: Уязвимость браузера Firefox, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10571: Уязвимость браузера Firefox ESR, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10572: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю читать данные из неинициализированных областей памяти\n\n * BDU:2015-10573: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10574: Уязвимость браузера Firefox ESR, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10575: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю получить доступ к содержимому ячеек памяти\n\n * BDU:2015-10576: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10577: Уязвимость браузера Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10578: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2015-10810: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-10811: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2015-10812: Уязвимость браузера Firefox, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10813: Уязвимость браузера Firefox ESR, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10814: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10815: Уязвимость браузера Firefox, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10816: Уязвимость браузера Firefox ESR, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10817: Уязвимость почтового клиента Thunderbird, позволяющая нарушителю повлиять на работу программы\n\n * BDU:2015-10818: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-10819: Уязвимость браузера Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2015-11042: Уязвимость библиотеки OpenSSL, позволяющая нарушителю проводить атаки, направленные на снижение стойкости алгоритма шифрования\n\n * BDU:2015-11311: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2015-2722: Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a shared worker.\n\n * CVE-2015-2724: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2725: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2726: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 39.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2728: The IndexedDatabaseManager class in the IndexedDB implementation in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 misinterprets an unspecified IDBDatabase field as a pointer, which allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors, related to a \"type confusion\" issue.\n\n * CVE-2015-2729: The AudioParamTimeline::AudioNodeInputValue function in the Web Audio implementation in Mozilla Firefox before 39.0 and Firefox ESR 38.x before 38.1 does not properly calculate an oscillator rendering range, which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (out-of-bounds read) via unspecified vectors.\n\n * CVE-2015-2731: Use-after-free vulnerability in the CSPService::ShouldLoad function in the microtask implementation in Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 allows remote attackers to execute arbitrary code by leveraging client-side JavaScript that triggers removal of a DOM object on the basis of a Content Policy.\n\n * CVE-2015-2733: Use-after-free vulnerability in the CanonicalizeXPCOMParticipant function in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 allows remote attackers to execute arbitrary code via vectors involving attachment of an XMLHttpRequest object to a dedicated worker.\n\n * CVE-2015-2734: The CairoTextureClientD3D9::BorrowDrawTarget function in the Direct3D 9 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2735: nsZipArchive.cpp in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.\n\n * CVE-2015-2736: The nsZipArchive::BuildFileList function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which allows remote attackers to have an unspecified impact via a crafted ZIP archive.\n\n * CVE-2015-2737: The rx::d3d11::SetBufferData function in the Direct3D 11 implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2738: The YCbCrImageDataDeserializer::ToDataSourceSurface function in the YCbCr implementation in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 reads data from uninitialized memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2739: The ArrayBufferBuilder::append function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 accesses unintended memory locations, which has unspecified impact and attack vectors.\n\n * CVE-2015-2740: Buffer overflow in the nsXMLHttpRequest::AppendToResponseText function in Mozilla Firefox before 39.0, Firefox ESR 31.x before 31.8 and 38.x before 38.1, and Thunderbird before 38.1 might allow remote attackers to cause a denial of service or have unspecified other impact via unknown vectors.\n\n * CVE-2015-2741: Mozilla Firefox before 39.0, Firefox ESR 38.x before 38.1, and Thunderbird before 38.1 do not enforce key pinning upon encountering an X.509 certificate problem that generates a user dialog, which allows user-assisted man-in-the-middle attackers to bypass intended access restrictions by triggering a (1) expired certificate or (2) mismatched hostname for a domain with pinning enabled.\n\n * CVE-2015-2743: PDF.js in Mozilla Firefox before 39.0 and Firefox ESR 31.x before 31.8 and 38.x before 38.1 enables excessive privileges for internal Workers, which might allow remote attackers to execute arbitrary code by leveraging a Same Origin Policy bypass.\n\n * CVE-2015-4000: The TLS protocol 1.2 and earlier, when a DHE_EXPORT ciphersuite is enabled on a server but not on a client, does not properly convey a DHE_EXPORT choice, which allows man-in-the-middle attackers to conduct cipher-downgrade attacks by rewriting a ClientHello with DHE replaced by DHE_EXPORT and then rewriting a ServerHello with DHE_EXPORT replaced by DHE, aka the \"Logjam\" issue.\n\n * CVE-2015-4497: Use-after-free vulnerability in the CanvasRenderingContext2D implementation in Mozilla Firefox before 40.0.3 and Firefox ESR 38.x before 38.2.1 allows remote attackers to execute arbitrary code by leveraging improper interaction between resize events and changes to Cascading Style Sheets (CSS) token sequences for a CANVAS element.\n\n * MFSA 2015-78: description unavailable",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2015-08-11"
},
"Updated": {
"Date": "2015-08-11"
},
"BDUs": [
{
"ID": "BDU:2015-10550",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10550",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10551",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10551",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10552",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10552",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10553",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10553",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10554",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10554",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10555",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10555",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10556",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10556",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10557",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10557",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10558",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10558",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10559",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10559",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10560",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10560",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10561",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10561",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10562",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10562",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10563",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-10563",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10564",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10564",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10565",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10565",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10566",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10566",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10567",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10567",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10568",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10568",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10569",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10569",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10570",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10570",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10571",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10571",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10572",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10572",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10573",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10573",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10574",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10574",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10575",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10575",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10576",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10576",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10577",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10577",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10578",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2015-10578",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10810",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2015-10810",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10811",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2015-10811",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10812",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10812",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10813",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10813",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10814",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10814",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10815",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10815",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10816",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10816",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10817",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10817",
"Impact": "Critical",
"Public": "20150705"
},
{
"ID": "BDU:2015-10818",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10818",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-10819",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://bdu.fstec.ru/vul/2015-10819",
"Impact": "High",
"Public": "20150705"
},
{
"ID": "BDU:2015-11042",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-310",
"Href": "https://bdu.fstec.ru/vul/2015-11042",
"Impact": "Low",
"Public": "20150520"
},
{
"ID": "BDU:2015-11311",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2015-11311",
"Impact": "Critical",
"Public": "20150829"
}
],
"CVEs": [
{
"ID": "CVE-2015-2722",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2722",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2724",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2724",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2725",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2725",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2726",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2726",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2728",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2728",
"Impact": "High",
"Public": "20150706"
},
{
"ID": "CVE-2015-2729",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2729",
"Impact": "Low",
"Public": "20150706"
},
{
"ID": "CVE-2015-2731",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2731",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2733",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2733",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2734",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2734",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2735",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2735",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2736",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2736",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2737",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2737",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2738",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2738",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2739",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2739",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2740",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2740",
"Impact": "Critical",
"Public": "20150706"
},
{
"ID": "CVE-2015-2741",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2741",
"Impact": "Low",
"Public": "20150706"
},
{
"ID": "CVE-2015-2743",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CWE": "CWE-17",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2743",
"Impact": "High",
"Public": "20150706"
},
{
"ID": "CVE-2015-4000",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-310",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4000",
"Impact": "Low",
"Public": "20150521"
},
{
"ID": "CVE-2015-4497",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-4497",
"Impact": "Critical",
"Public": "20150829"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20151669001",
"Comment": "firefox-esr is earlier than 0:38.1.1-alt1"
}
]
}
]
}
}
]
}