892 lines
44 KiB
JSON
892 lines
44 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20162425",
|
||
"Version": "oval:org.altlinux.errata:def:20162425",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2016-2425: package `chromium` update to version 55.0.2883.75-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2016-2425",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-2425",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00102",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00102",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00103",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00103",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00104",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00104",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00105",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00105",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00106",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00106",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00107",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00107",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00108",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00108",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00109",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00109",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00110",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00110",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00111",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00111",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00112",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00112",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00113",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00113",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00114",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00114",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00115",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00115",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00116",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00116",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00140",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00140",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00141",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00141",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00142",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00142",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00143",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00143",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00144",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00144",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00145",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00145",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00146",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00146",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00147",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00147",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00148",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00148",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00149",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00149",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00150",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00150",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00151",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00151",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00152",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00152",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2017-00173",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2017-00173",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5198",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5198",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5199",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5199",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5200",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5200",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5201",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5201",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5203",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5203",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5204",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5204",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5205",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5205",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5206",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5206",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5207",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5207",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5208",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5208",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5209",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5209",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5210",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5210",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5211",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5211",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5212",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5212",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5213",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5213",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5214",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5214",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5215",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5215",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5216",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5216",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5217",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5217",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5218",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5218",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5219",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5219",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5220",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5220",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5221",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5221",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5222",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5222",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5223",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5223",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5224",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5224",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5225",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5225",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-5226",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-5226",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9650",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9650",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9651",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9651",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2016-9652",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9652",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium to version 55.0.2883.75-alt1. \nSecurity Fix(es):\n\n * BDU:2017-00102: Уязвимость браузера Google Chrome, позволяющая нарушителю получить сведения об интеграционной платформе и операционной системе\n\n * BDU:2017-00103: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать аварийное завершение работы приложения\n\n * BDU:2017-00104: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2017-00105: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00106: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2017-00107: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти буферную проверкку\n\n * BDU:2017-00108: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2017-00109: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00110: Уязвимость браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox\n\n * BDU:2017-00111: Уязвимость браузера Google Chrome, позволяющая нарушителю нарушить конфиденциальность информации\n\n * BDU:2017-00112: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00113: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00114: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2017-00115: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00116: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2017-00140: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00141: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00142: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00143: Уязвимость браузера Google Chrome, позволяющая нарушителю получить сведения об интеграционной платформе и операционной системе\n\n * BDU:2017-00144: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00145: Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа\n\n * BDU:2017-00146: Уязвимость браузера Google Chrome, позволяющая нарушителю получить сведения об интеграционной платформе и операционной системе\n\n * BDU:2017-00147: Уязвимость браузера Google Chrome, позволяющая нарушителю получить сведения об интеграционной платформе и операционной системе\n\n * BDU:2017-00148: Уязвимость браузера Google Chrome, позволяющая нарушителю получить доступ к защищаемой информации\n\n * BDU:2017-00149: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие на систему\n\n * BDU:2017-00150: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00151: Уязвимость браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-00152: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2017-00173: Уязвимость браузера Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * CVE-2016-5198: V8 in Google Chrome prior to 54.0.2840.90 for Linux, and 54.0.2840.85 for Android, and 54.0.2840.87 for Windows and Mac included incorrect optimisation assumptions, which allowed a remote attacker to perform arbitrary read/write operations, leading to code execution, via a crafted HTML page.\n\n * CVE-2016-5199: An off by one error resulting in an allocation of zero size in FFmpeg in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted video file.\n\n * CVE-2016-5200: V8 in Google Chrome prior to 54.0.2840.98 for Mac, and 54.0.2840.99 for Windows, and 54.0.2840.100 for Linux, and 55.0.2883.84 for Android incorrectly applied type rules, which allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2016-5201: A leak of privateClass in the extensions API in Google Chrome prior to 54.0.2840.100 for Linux, and 54.0.2840.99 for Windows, and 54.0.2840.98 for Mac allowed a remote attacker to access privileged JavaScript code via a crafted HTML page.\n\n * CVE-2016-5203: A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2016-5204: Leaking of an SVG shadow tree leading to corruption of the DOM tree in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.\n\n * CVE-2016-5205: Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac, incorrectly handles deferred page loads, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.\n\n * CVE-2016-5206: The PDF plugin in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly followed redirects, which allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.\n\n * CVE-2016-5207: In Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android, corruption of the DOM tree could occur during the removal of a full screen element, which allowed a remote attacker to achieve arbitrary code execution via a crafted HTML page.\n\n * CVE-2016-5208: Blink in Google Chrome prior to 55.0.2883.75 for Linux and Windows, and 55.0.2883.84 for Android allowed possible corruption of the DOM tree during synchronous event handling, which allowed a remote attacker to inject arbitrary scripts or HTML (UXSS) via a crafted HTML page.\n\n * CVE-2016-5209: Bad casting in bitmap manipulation in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2016-5210: Heap buffer overflow during TIFF image parsing in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2016-5211: A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2016-5212: Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android insufficiently sanitized DevTools URLs, which allowed a remote attacker to read local files via a crafted HTML page.\n\n * CVE-2016-5213: A use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2016-5214: Google Chrome prior to 55.0.2883.75 for Windows mishandled downloaded files, which allowed a remote attacker to prevent the downloaded file from receiving the Mark of the Web via a crafted HTML page.\n\n * CVE-2016-5215: A use after free in webaudio in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2016-5216: A use after free in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.\n\n * CVE-2016-5217: The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly permitted access to privileged plugins, which allowed a remote attacker to bypass site isolation via a crafted HTML page.\n\n * CVE-2016-5218: The extensions API in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to temporarily spoof the contents of the Omnibox (URL bar) via a crafted HTML page containing PDF data.\n\n * CVE-2016-5219: A heap use after free in V8 in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2016-5220: PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled navigation within PDFs, which allowed a remote attacker to read local files via a crafted PDF file.\n\n * CVE-2016-5221: Type confusion in libGLESv2 in ANGLE in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android possibly allowed a remote attacker to bypass buffer validation via a crafted HTML page.\n\n * CVE-2016-5222: Incorrect handling of invalid URLs in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2016-5223: Integer overflow in PDFium in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to potentially exploit heap corruption or DoS via a crafted PDF file.\n\n * CVE-2016-5224: A timing attack on denormalized floating point arithmetic in SVG filters in Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android allowed a remote attacker to bypass the Same Origin Policy via a crafted HTML page.\n\n * CVE-2016-5225: Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled form actions, which allowed a remote attacker to bypass Content Security Policy via a crafted HTML page.\n\n * CVE-2016-5226: Blink in Google Chrome prior to 55.0.2883.75 for Linux, Windows and Mac executed javascript: URLs entered in the URL bar in the context of the current tab, which allowed a socially engineered user to XSS themselves by dragging and dropping a javascript: URL into the URL bar.\n\n * CVE-2016-9650: Blink in Google Chrome prior to 55.0.2883.75 for Mac, Windows and Linux, and 55.0.2883.84 for Android incorrectly handled iframes, which allowed a remote attacker to bypass a no-referrer policy via a crafted HTML page.\n\n * CVE-2016-9651: A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2016-9652: Multiple unspecified vulnerabilities in Google Chrome before 55.0.2883.75.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2016-12-08"
|
||
},
|
||
"Updated": {
|
||
"Date": "2016-12-08"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2017-00102",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00102",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00103",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00103",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00104",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-189",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00104",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00105",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00105",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00106",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00106",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00107",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00107",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00108",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00108",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00109",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00109",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00110",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00110",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00111",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00111",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00112",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00112",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00113",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00113",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00114",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00114",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00115",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00115",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00116",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00116",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00140",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00140",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00141",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00141",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00142",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00142",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00143",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00143",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00144",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00144",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00145",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00145",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00146",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00146",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00147",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00147",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00148",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00148",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00149",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00149",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00150",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00150",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00151",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00151",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00152",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00152",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "BDU:2017-00173",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://bdu.fstec.ru/vul/2017-00173",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2016-5198",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5198",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5199",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5199",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5200",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5200",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5201",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5201",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5203",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5203",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5204",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5204",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5205",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5205",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5206",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5206",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5207",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5207",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5208",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5208",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5209",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5209",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5210",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5210",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5211",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5211",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5212",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5212",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5213",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5213",
|
||
"Impact": "High",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5214",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5214",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5215",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5215",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5216",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5216",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5217",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-284",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5217",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5218",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5218",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5219",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5219",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5220",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5220",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5221",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5221",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5222",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5222",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5223",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5223",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5224",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-189",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5224",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5225",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5225",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-5226",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-5226",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9650",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9650",
|
||
"Impact": "Low",
|
||
"Public": "20170119"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9651",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-94",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9651",
|
||
"Impact": "High",
|
||
"Public": "20190109"
|
||
},
|
||
{
|
||
"ID": "CVE-2016-9652",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9652",
|
||
"Impact": "Critical",
|
||
"Public": "20191120"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162425001",
|
||
"Comment": "chromium is earlier than 0:55.0.2883.75-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162425002",
|
||
"Comment": "chromium-gnome is earlier than 0:55.0.2883.75-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20162425003",
|
||
"Comment": "chromium-kde is earlier than 0:55.0.2883.75-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |