2024-06-28 13:17:52 +00:00

1103 lines
58 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20193331",
"Version": "oval:org.altlinux.errata:def:20193331",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-3331: package `chromium` update to version 79.0.3945.79-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c10f1"
],
"Products": [
"ALT SP Workstation",
"ALT SP Server"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-3331",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-3331",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-01424",
"RefURL": "https://bdu.fstec.ru/vul/2020-01424",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01433",
"RefURL": "https://bdu.fstec.ru/vul/2020-01433",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01438",
"RefURL": "https://bdu.fstec.ru/vul/2020-01438",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01439",
"RefURL": "https://bdu.fstec.ru/vul/2020-01439",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01440",
"RefURL": "https://bdu.fstec.ru/vul/2020-01440",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01441",
"RefURL": "https://bdu.fstec.ru/vul/2020-01441",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01465",
"RefURL": "https://bdu.fstec.ru/vul/2020-01465",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01466",
"RefURL": "https://bdu.fstec.ru/vul/2020-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01467",
"RefURL": "https://bdu.fstec.ru/vul/2020-01467",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01505",
"RefURL": "https://bdu.fstec.ru/vul/2020-01505",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01634",
"RefURL": "https://bdu.fstec.ru/vul/2020-01634",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01635",
"RefURL": "https://bdu.fstec.ru/vul/2020-01635",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01636",
"RefURL": "https://bdu.fstec.ru/vul/2020-01636",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01637",
"RefURL": "https://bdu.fstec.ru/vul/2020-01637",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01638",
"RefURL": "https://bdu.fstec.ru/vul/2020-01638",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01639",
"RefURL": "https://bdu.fstec.ru/vul/2020-01639",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01644",
"RefURL": "https://bdu.fstec.ru/vul/2020-01644",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01646",
"RefURL": "https://bdu.fstec.ru/vul/2020-01646",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01693",
"RefURL": "https://bdu.fstec.ru/vul/2020-01693",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01694",
"RefURL": "https://bdu.fstec.ru/vul/2020-01694",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01695",
"RefURL": "https://bdu.fstec.ru/vul/2020-01695",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01696",
"RefURL": "https://bdu.fstec.ru/vul/2020-01696",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01697",
"RefURL": "https://bdu.fstec.ru/vul/2020-01697",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01698",
"RefURL": "https://bdu.fstec.ru/vul/2020-01698",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01699",
"RefURL": "https://bdu.fstec.ru/vul/2020-01699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01700",
"RefURL": "https://bdu.fstec.ru/vul/2020-01700",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01701",
"RefURL": "https://bdu.fstec.ru/vul/2020-01701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01702",
"RefURL": "https://bdu.fstec.ru/vul/2020-01702",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01703",
"RefURL": "https://bdu.fstec.ru/vul/2020-01703",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01704",
"RefURL": "https://bdu.fstec.ru/vul/2020-01704",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01705",
"RefURL": "https://bdu.fstec.ru/vul/2020-01705",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01706",
"RefURL": "https://bdu.fstec.ru/vul/2020-01706",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01798",
"RefURL": "https://bdu.fstec.ru/vul/2020-01798",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01799",
"RefURL": "https://bdu.fstec.ru/vul/2020-01799",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01800",
"RefURL": "https://bdu.fstec.ru/vul/2020-01800",
"Source": "BDU"
},
{
"RefID": "BDU:2020-01802",
"RefURL": "https://bdu.fstec.ru/vul/2020-01802",
"Source": "BDU"
},
{
"RefID": "CVE-2019-13725",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13726",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13727",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13728",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13730",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13732",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13737",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13739",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13740",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13741",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13742",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13743",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13744",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13745",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13746",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13747",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13748",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13749",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13751",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13752",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13753",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13754",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13755",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13756",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13757",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13758",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13759",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13761",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13762",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13763",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13764",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 79.0.3945.79-alt1. \nSecurity Fix(es):\n\n * BDU:2020-01424: Уязвимость механизма ввода данных в Blink браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01433: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01438: Уязвимость механизма обработки внешних протоколов браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01439: Уязвимость механизма обработки файлов cookie браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01440: Уязвимость механизма обработки аудио файлове браузера Google Chrome, связанная с раскрытием информации при обработке данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01441: Уязвимость механизма в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01465: Уязвимость механизма рендеринга в Android браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * BDU:2020-01466: Уязвимость инструментов разработки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01467: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01505: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01634: Уязвимость механизма навигации в Android браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01635: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01636: Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01637: Уязвимость политики безопасности расширений браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-01638: Уязвимость политики безопасности расширений браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01639: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01644: Уязвимость механизма обработки данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01646: Уязвимость механизма инициализации данных SQLite браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным\n\n * BDU:2020-01693: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01694: Уязвимость браузера Google Chrome, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01695: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01696: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01697: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01698: Уязвимость браузера Google Chrome, связанная с доступом к ресурсу с использованием несовместимого типа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01699: Уязвимость браузера Google Chrome, связанная с использованием памяти после освобождения, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01700: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01701: Уязвимость браузера Google Chrome, связанная с записью за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01702: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01703: Уязвимость браузера Google Chrome, связанная с раскрытием информации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2020-01704: Уязвимость браузера Google Chrome, связанная с неправильным назначением прав доступа для критического ресурса, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и нарушить ее целостность и доступность\n\n * BDU:2020-01705: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01706: Уязвимость браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-01798: Уязвимость пользовательского интерфейса в интерстициалах браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01799: Уязвимость пользовательского интерфейса в Omnibox браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01800: Уязвимость механизма загрузки браузера Google Chrome, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-01802: Уязвимость функции типизации в JavaScript браузера Google Chrome позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных\n\n * CVE-2019-13725: Use-after-free in Bluetooth in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13726: Buffer overflow in password manager in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-13727: Insufficient policy enforcement in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2019-13728: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13729: Use-after-free in WebSockets in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13730: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13732: Use-after-free in WebAudio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13734: Out of bounds write in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13735: Out of bounds write in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-13736: Integer overflow in PDFium in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2019-13737: Insufficient policy enforcement in autocomplete in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13738: Insufficient policy enforcement in navigation in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2019-13739: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13740: Incorrect security UI in sharing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13741: Insufficient validation of untrusted input in Blink in Google Chrome prior to 79.0.3945.79 allowed a local attacker to bypass same origin policy via crafted clipboard content.\n\n * CVE-2019-13742: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2019-13743: Incorrect security UI in external protocol handling in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof security UI via a crafted HTML page.\n\n * CVE-2019-13744: Insufficient policy enforcement in cookies in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13745: Insufficient policy enforcement in audio in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13746: Insufficient policy enforcement in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13747: Uninitialized data in rendering in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-13748: Insufficient policy enforcement in developer tools in Google Chrome prior to 79.0.3945.79 allowed a local attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13749: Incorrect security UI in Omnibox in Google Chrome on iOS prior to 79.0.3945.79 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2019-13750: Insufficient data validation in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass defense-in-depth measures via a crafted HTML page.\n\n * CVE-2019-13751: Uninitialized data in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13752: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13753: Out of bounds read in SQLite in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2019-13754: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13755: Insufficient policy enforcement in extensions in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to disable extensions via a crafted HTML page.\n\n * CVE-2019-13756: Incorrect security UI in printing in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13757: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13758: Insufficient policy enforcement in navigation in Google Chrome on Android prior to 79.0.3945.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2019-13759: Incorrect security UI in interstitials in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-13761: Incorrect security UI in Omnibox in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2019-13762: Insufficient policy enforcement in downloads in Google Chrome on Windows prior to 79.0.3945.79 allowed a local attacker to spoof downloaded files via local code.\n\n * CVE-2019-13763: Insufficient policy enforcement in payments in Google Chrome prior to 79.0.3945.79 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.\n\n * CVE-2019-13764: Type confusion in JavaScript in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-12-20"
},
"Updated": {
"Date": "2019-12-20"
},
"BDUs": [
{
"ID": "BDU:2020-01424",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01424",
"Impact": "High",
"Public": "20200108"
},
{
"ID": "BDU:2020-01433",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01433",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01438",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01438",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01439",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01439",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01440",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01440",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01441",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01441",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01465",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01465",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "BDU:2020-01466",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01466",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01467",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01467",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01505",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01505",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01634",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01634",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01635",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01635",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01636",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01636",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01637",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01637",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01638",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01638",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01639",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01639",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01644",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-01644",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01646",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01646",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01693",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01693",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01694",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2020-01694",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01695",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01695",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01696",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01696",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01697",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01697",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01698",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01698",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01699",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-01699",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01700",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01700",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01701",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-01701",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01702",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-01702",
"Impact": "High",
"Public": "20191125"
},
{
"ID": "BDU:2020-01703",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2020-01703",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01704",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-732",
"Href": "https://bdu.fstec.ru/vul/2020-01704",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01705",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01705",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01706",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01706",
"Impact": "Low",
"Public": "20191125"
},
{
"ID": "BDU:2020-01798",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01798",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01799",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01799",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01800",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-01800",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "BDU:2020-01802",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-01802",
"Impact": "High",
"Public": "20191210"
}
],
"CVEs": [
{
"ID": "CVE-2019-13725",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13725",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13726",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13726",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13727",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-281",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13727",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13728",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13728",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13729",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13729",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13730",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13730",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13732",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13732",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13734",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13734",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13735",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13735",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13736",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13736",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13737",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13737",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13738",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-269",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13738",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13739",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13739",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13740",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-346",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13740",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13741",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13741",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13742",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13742",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13743",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13743",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13744",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13744",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13745",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13745",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13746",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13746",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13747",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13747",
"Impact": "High",
"Public": "20191210"
},
{
"ID": "CVE-2019-13748",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-862",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13748",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13749",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13749",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13750",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13750",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13751",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13751",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13752",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13752",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13753",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13753",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13754",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13754",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13755",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13755",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13756",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13756",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13757",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13757",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13758",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13758",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13759",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13759",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13761",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13761",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13762",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-667",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13762",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13763",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13763",
"Impact": "Low",
"Public": "20191210"
},
{
"ID": "CVE-2019-13764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13764",
"Impact": "High",
"Public": "20191210"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:10",
"cpe:/o:alt:spserver:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20193331001",
"Comment": "chromium is earlier than 0:79.0.3945.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193331002",
"Comment": "chromium-gnome is earlier than 0:79.0.3945.79-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193331003",
"Comment": "chromium-kde is earlier than 0:79.0.3945.79-alt1"
}
]
}
]
}
}
]
}