vuln-list-alt/oval/c9f2/ALT-PU-2019-1529/definitions.json
2024-06-28 13:17:52 +00:00

668 lines
34 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20191529",
"Version": "oval:org.altlinux.errata:def:20191529",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-1529: package `chromium` update to version 73.0.3683.75-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-1529",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-1529",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01094",
"RefURL": "https://bdu.fstec.ru/vul/2019-01094",
"Source": "BDU"
},
{
"RefID": "BDU:2019-01953",
"RefURL": "https://bdu.fstec.ru/vul/2019-01953",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03324",
"RefURL": "https://bdu.fstec.ru/vul/2019-03324",
"Source": "BDU"
},
{
"RefID": "BDU:2019-03623",
"RefURL": "https://bdu.fstec.ru/vul/2019-03623",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00687",
"RefURL": "https://bdu.fstec.ru/vul/2020-00687",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00701",
"RefURL": "https://bdu.fstec.ru/vul/2020-00701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00705",
"RefURL": "https://bdu.fstec.ru/vul/2020-00705",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00750",
"RefURL": "https://bdu.fstec.ru/vul/2020-00750",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00751",
"RefURL": "https://bdu.fstec.ru/vul/2020-00751",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00761",
"RefURL": "https://bdu.fstec.ru/vul/2020-00761",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00763",
"RefURL": "https://bdu.fstec.ru/vul/2020-00763",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00764",
"RefURL": "https://bdu.fstec.ru/vul/2020-00764",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00768",
"RefURL": "https://bdu.fstec.ru/vul/2020-00768",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00769",
"RefURL": "https://bdu.fstec.ru/vul/2020-00769",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00770",
"RefURL": "https://bdu.fstec.ru/vul/2020-00770",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00772",
"RefURL": "https://bdu.fstec.ru/vul/2020-00772",
"Source": "BDU"
},
{
"RefID": "BDU:2020-00774",
"RefURL": "https://bdu.fstec.ru/vul/2020-00774",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00055",
"RefURL": "https://bdu.fstec.ru/vul/2022-00055",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00072",
"RefURL": "https://bdu.fstec.ru/vul/2022-00072",
"Source": "BDU"
},
{
"RefID": "CVE-2019-5784",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5784",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5786",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5786",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5787",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5787",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5788",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5788",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5789",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5789",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5790",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5790",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5791",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5791",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5792",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5792",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5793",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5793",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5794",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5794",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5795",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5795",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5796",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5796",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5797",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5797",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5798",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5798",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5799",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5799",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5800",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5800",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5801",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5801",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5802",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5802",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5803",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5803",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5804",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5844",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5844",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5845",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5845",
"Source": "CVE"
},
{
"RefID": "CVE-2019-5846",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-5846",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 73.0.3683.75-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01094: Уязвимость компонента FileReader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-01953: Уязвимость функции LibRaw :: kodak_ycbcr_load_raw библиотеки для обработки изображений LibRaw, связанная c переполнением буфера на основе кучи, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-03324: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-03623: Уязвимость браузера Google Chrome, связанная с ошибками при наследовании политики безопасности для новых документов, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00687: Уязвимость графической библиотеки Skia браузера Google Chrome, связанная с чтением за границами буфера данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-00701: Уязвимость гостевого представления расширений браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-00705: Уязвимость обработчика PDF-содержимого PDFium веб-браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-00750: Уязвимость браузера Google Chrome, связанная с целочисленным переполнением, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00751: Уязвимость браузера Google Chrome, связанная с недостаточным применение политики безопасности контента, позволяющая нарушителю нарушить целостность данных\n\n * BDU:2020-00761: Уязвимость функции WebMIDI браузера Google Chrome, связанная с целочисленным переполнение, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00763: Уязвимость веб-браузера Google Chrome, связанная с выделением избыточных полномочий при установке программы-расширения, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00764: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00768: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-00769: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2020-00770: Уязвимость механизма отображения веб-страниц Blink веб-браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2020-00772: Уязвимость функции Navigation браузера Google Chrome, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-00774: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-00055: Уязвимость интерфейса командной строки браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2022-00072: Уязвимость адресной строки Omnibox браузера Google Chrome, позволяющая нарушителю проводить спуфинг атаки с помощью специально созданной HTML страницы\n\n * CVE-2019-5784: Incorrect handling of deferred code in V8 in Google Chrome prior to 72.0.3626.96 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5786: Object lifetime issue in Blink in Google Chrome prior to 72.0.3626.121 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2019-5787: Use-after-garbage-collection in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5788: An integer overflow that leads to a use-after-free in Blink Storage in Google Chrome on Linux prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-5789: An integer overflow that leads to a use-after-free in WebMIDI in Google Chrome on Windows prior to 73.0.3683.75 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2019-5790: An integer overflow leading to an incorrect capacity of a buffer in JavaScript in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2019-5791: Inappropriate optimization in V8 in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2019-5792: Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.\n\n * CVE-2019-5793: Insufficient policy enforcement in extensions in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to initiate the extensions installation user interface via a crafted HTML page.\n\n * CVE-2019-5794: Incorrect handling of cancelled requests in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5795: Integer overflow in PDFium in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file.\n\n * CVE-2019-5796: Data race in extensions guest view in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5797: Double free in DOMStorage in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5798: Lack of correct bounds checking in Skia in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2019-5799: Incorrect inheritance of a new document's policy in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5800: Insufficient policy enforcement in Blink in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5801: Incorrect eliding of URLs in Omnibox in Google Chrome on iOS prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5802: Incorrect handling of download origins in Navigation in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2019-5803: Insufficient policy enforcement in Content Security Policy in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to bypass content security policy via a crafted HTML page.\n\n * CVE-2019-5804: Incorrect command line processing in Chrome in Google Chrome prior to 73.0.3683.75 allowed a local attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2019-5844: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5845: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2019-5846: Out of bounds access in SwiftShader in Google Chrome prior to 73.0.3683.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-03-27"
},
"Updated": {
"Date": "2019-03-27"
},
"BDUs": [
{
"ID": "BDU:2019-01094",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-01094",
"Impact": "Critical",
"Public": "20190301"
},
{
"ID": "BDU:2019-01953",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-01953",
"Impact": "Low",
"Public": "20181207"
},
{
"ID": "BDU:2019-03324",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-03324",
"Impact": "High",
"Public": "20190312"
},
{
"ID": "BDU:2019-03623",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-03623",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "BDU:2020-00687",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-00687",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "BDU:2020-00701",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2020-00701",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "BDU:2020-00705",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00705",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "BDU:2020-00750",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-00750",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "BDU:2020-00751",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-00751",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "BDU:2020-00761",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00761",
"Impact": "High",
"Public": "20190114"
},
{
"ID": "BDU:2020-00763",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-00763",
"Impact": "Low",
"Public": "20190302"
},
{
"ID": "BDU:2020-00764",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00764",
"Impact": "High",
"Public": "20181213"
},
{
"ID": "BDU:2020-00768",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-00768",
"Impact": "High",
"Public": "20190130"
},
{
"ID": "BDU:2020-00769",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2020-00769",
"Impact": "Low",
"Public": "20190120"
},
{
"ID": "BDU:2020-00770",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00770",
"Impact": "High",
"Public": "20190128"
},
{
"ID": "BDU:2020-00772",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2020-00772",
"Impact": "Low",
"Public": "20190224"
},
{
"ID": "BDU:2020-00774",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2020-00774",
"Impact": "High",
"Public": "20181214"
},
{
"ID": "BDU:2022-00055",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-88",
"Href": "https://bdu.fstec.ru/vul/2022-00055",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "BDU:2022-00072",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2022-00072",
"Impact": "Low",
"Public": "20190523"
}
],
"CVEs": [
{
"ID": "CVE-2019-5784",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5784",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2019-5786",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5786",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2019-5787",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5787",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5788",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5788",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5789",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5789",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5790",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5790",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5791",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5791",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5792",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5792",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5793",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5793",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5794",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5794",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5795",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5795",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5796",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5796",
"Impact": "High",
"Public": "20190523"
},
{
"ID": "CVE-2019-5797",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-415",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5797",
"Impact": "High",
"Public": "20220929"
},
{
"ID": "CVE-2019-5798",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5798",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5799",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5799",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5800",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5800",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5801",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5801",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5802",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5802",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5803",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5803",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5804",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N",
"CWE": "CWE-88",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5804",
"Impact": "Low",
"Public": "20190523"
},
{
"ID": "CVE-2019-5844",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5844",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-5845",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5845",
"Impact": "Low",
"Public": "20200103"
},
{
"ID": "CVE-2019-5846",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-5846",
"Impact": "Low",
"Public": "20200103"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20191529001",
"Comment": "chromium is earlier than 0:73.0.3683.75-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191529002",
"Comment": "chromium-gnome is earlier than 0:73.0.3683.75-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20191529003",
"Comment": "chromium-kde is earlier than 0:73.0.3683.75-alt1"
}
]
}
]
}
}
]
}