668 lines
34 KiB
JSON
668 lines
34 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20191529",
|
||
"Version": "oval:org.altlinux.errata:def:20191529",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2019-1529: package `chromium` update to version 73.0.3683.75-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2019-1529",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1529",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01094",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01094",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-01953",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-01953",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03324",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03324",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-03623",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-03623",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00687",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00687",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00701",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00701",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00705",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00705",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00750",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00750",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00751",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00751",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00761",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00761",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00763",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00763",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00764",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00764",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00768",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00768",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00769",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00769",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00770",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00770",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00772",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00772",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-00774",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-00774",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00055",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00055",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00072",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00072",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5784",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5784",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5786",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5786",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5787",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5787",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5788",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5788",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5789",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5789",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5790",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5790",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5791",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5791",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5792",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5792",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5793",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5793",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5794",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5794",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5795",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5795",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5797",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5797",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5798",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5798",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5799",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5799",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5800",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5800",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5801",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5801",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5802",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5802",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5803",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5803",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5804",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5804",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5844",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5844",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5845",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5845",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-5846",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5846",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium to version 73.0.3683.75-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01094: Уязвимость компонента FileReader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-01953: Уязвимость функции LibRaw :: kodak_ycbcr_load_raw библиотеки для обработки изображений LibRaw, связанная c переполнением буфера на основе кучи, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03324: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-03623: Уязвимость браузера Google Chrome, связанная с ошибками при наследовании политики безопасности для новых документов, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00687: Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с чтением за границами буфера данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-00701: Уязвимость гостевого представления расширений браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00705: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-00750: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00751: Уязвимость браузера Google Chrome, связанная с недостаточным применение политики безопасности контента, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00761: Уязвимость функции WebMIDI браузера Google Chrome, связанная с целочисленным переполнение, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00763: Уязвимость веб-браузера Google Chrome, связанная с выделением избыточных полномочий при установке программы-расширения, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00764: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00768: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00769: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2020-00770: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-00772: Уязвимость функции Navigation браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00774: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00055: Уязвимость интерфейса командной строки браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-00072: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг атаки с помощью специально созданной HTML страницы\n\n * CVE-2019-5784: Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5786: Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2019-5787: Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5788: An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-5789: An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-5790: An integer overflow leading to an incorrect capacity of a buffer in JavaScript in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-5791: Inappropriate optimization in V8 in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2019-5792: Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.\n\n * CVE-2019-5793: Insufficient policy enforcement in extensions in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to initiate the extensions installation user interface via a crafted HTML page.\n\n * CVE-2019-5794: Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5795: Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.\n\n * CVE-2019-5796: Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5797: Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5798: Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2019-5799: Incorrect inheritance of a new document's policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5800: Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5801: Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5802: Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5803: Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5804: Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2019-5844: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5845: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5846: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2019-03-27"
|
||
},
|
||
"Updated": {
|
||
"Date": "2019-03-27"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-01094",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01094",
|
||
"Impact": "Critical",
|
||
"Public": "20190301"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-01953",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-01953",
|
||
"Impact": "Low",
|
||
"Public": "20181207"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03324",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03324",
|
||
"Impact": "High",
|
||
"Public": "20190312"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-03623",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-03623",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00687",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00687",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00701",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00701",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00705",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00705",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00750",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00750",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00751",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00751",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00761",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00761",
|
||
"Impact": "High",
|
||
"Public": "20190114"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00763",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00763",
|
||
"Impact": "Low",
|
||
"Public": "20190302"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00764",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00764",
|
||
"Impact": "High",
|
||
"Public": "20181213"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00768",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00768",
|
||
"Impact": "High",
|
||
"Public": "20190130"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00769",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00769",
|
||
"Impact": "Low",
|
||
"Public": "20190120"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00770",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00770",
|
||
"Impact": "High",
|
||
"Public": "20190128"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00772",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00772",
|
||
"Impact": "Low",
|
||
"Public": "20190224"
|
||
},
|
||
{
|
||
"ID": "BDU:2020-00774",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-00774",
|
||
"Impact": "High",
|
||
"Public": "20181214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00055",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-88",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00055",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00072",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00072",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-5784",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5784",
|
||
"Impact": "Low",
|
||
"Public": "20190627"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5786",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5786",
|
||
"Impact": "Low",
|
||
"Public": "20190627"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5787",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5787",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5788",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5788",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5789",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5789",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5790",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5790",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5791",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5791",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5792",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5792",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5793",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5793",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5794",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5794",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5795",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5795",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5796",
|
||
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-362",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5796",
|
||
"Impact": "High",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5797",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-415",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5797",
|
||
"Impact": "High",
|
||
"Public": "20220929"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5798",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5798",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5799",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5799",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5800",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5800",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5801",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5801",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5802",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5802",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5803",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5803",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5804",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
|
||
"CWE": "CWE-88",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5804",
|
||
"Impact": "Low",
|
||
"Public": "20190523"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5844",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5844",
|
||
"Impact": "Low",
|
||
"Public": "20200103"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5845",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5845",
|
||
"Impact": "Low",
|
||
"Public": "20200103"
|
||
},
|
||
{
|
||
"ID": "CVE-2019-5846",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5846",
|
||
"Impact": "Low",
|
||
"Public": "20200103"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191529001",
|
||
"Comment": "chromium is earlier than 0:73.0.3683.75-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191529002",
|
||
"Comment": "chromium-gnome is earlier than 0:73.0.3683.75-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20191529003",
|
||
"Comment": "chromium-kde is earlier than 0:73.0.3683.75-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |