340 lines
16 KiB
JSON
340 lines
16 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20161630",
|
|
"Version": "oval:org.altlinux.errata:def:20161630",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2016-1630: package `firefox` update to version 47.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c10f1"
|
|
],
|
|
"Products": [
|
|
"ALT SP Workstation",
|
|
"ALT SP Server"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2016-1630",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1630",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01546",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01546",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01547",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01547",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01548",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01548",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01549",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01549",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01550",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01550",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01551",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01551",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2016-01553",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2016-01553",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2815",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2815",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2818",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2818",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2819",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2819",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2821",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2821",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2822",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2822",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2825",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2825",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2828",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2828",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2829",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2829",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2831",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2831",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2832",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2832",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2833",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2833",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2016-2834",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2834",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades firefox to version 47.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01546: Уязвимость набора библиотек Network Security Services и браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие\n\n * BDU:2016-01547: Уязвимость браузера Firefox, позволяющая нарушителю провести XSS-атаки\n\n * BDU:2016-01548: Уязвимость браузера Firefox, позволяющая нарушителю получить доступ к полному списку отключенных плагинов\n\n * BDU:2016-01549: Уязвимость браузеров Firefox ESR и Firefox, позволяющая нарушителю вызвать отказ в обслуживании, провести кликджекинг или спуфинг-атаку\n\n * BDU:2016-01550: Уязвимость браузера Firefox, позволяющая нарушителю повлиять на целостность информации\n\n * BDU:2016-01551: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01553: Уязвимость браузера Firefox, позволяющая нарушителю обойти существующую политику ограничения доступа и изменить свойство location.host\n\n * CVE-2016-2815: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2818: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2819: Heap-based buffer overflow in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via foreign-context HTML5 fragments, as demonstrated by fragments within an SVG element.\n\n * CVE-2016-2821: Use-after-free vulnerability in the mozilla::dom::Element class in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2, when contenteditable mode is enabled, allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) by triggering deletion of DOM elements that were created in the editor.\n\n * CVE-2016-2822: Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allow remote attackers to spoof the address bar via a SELECT element with a persistent menu.\n\n * CVE-2016-2825: Mozilla Firefox before 47.0 allows remote attackers to bypass the Same Origin Policy and modify the location.host property via an invalid data: URL.\n\n * CVE-2016-2828: Use-after-free vulnerability in Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 allows remote attackers to execute arbitrary code via WebGL content that triggers texture access after destruction of the texture's recycle pool.\n\n * CVE-2016-2829: Mozilla Firefox before 47.0 allows remote attackers to spoof permission notifications via a crafted web site that rapidly triggers permission requests, as demonstrated by the microphone permission or the geolocation permission.\n\n * CVE-2016-2831: Mozilla Firefox before 47.0 and Firefox ESR 45.x before 45.2 do not ensure that the user approves the fullscreen and pointerlock settings, which allows remote attackers to cause a denial of service (UI outage), or conduct clickjacking or spoofing attacks, via a crafted web site.\n\n * CVE-2016-2832: Mozilla Firefox before 47.0 allows remote attackers to discover the list of disabled plugins via a fingerprinting attack involving Cascading Style Sheets (CSS) pseudo-classes.\n\n * CVE-2016-2833: Mozilla Firefox before 47.0 ignores Content Security Policy (CSP) directives for cross-domain Java applets, which makes it easier for remote attackers to conduct cross-site scripting (XSS) attacks via a crafted applet.\n\n * CVE-2016-2834: Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2016-06-21"
|
|
},
|
|
"Updated": {
|
|
"Date": "2016-06-21"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2016-01546",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-17",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01546",
|
|
"Impact": "Critical",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01547",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01547",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01548",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01548",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01549",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01549",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01550",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01550",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01551",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01551",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "BDU:2016-01553",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://bdu.fstec.ru/vul/2016-01553",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2016-2815",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2815",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2818",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2818",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2819",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2819",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2821",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2821",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2822",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2822",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2825",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2825",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2828",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2828",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2829",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-284",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2829",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2831",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:H",
|
|
"CWE": "CWE-254",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2831",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2832",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2832",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2833",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2833",
|
|
"Impact": "Low",
|
|
"Public": "20160613"
|
|
},
|
|
{
|
|
"ID": "CVE-2016-2834",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2834",
|
|
"Impact": "High",
|
|
"Public": "20160613"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:10",
|
|
"cpe:/o:alt:spserver:10"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161630001",
|
|
"Comment": "firefox is earlier than 0:47.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161630002",
|
|
"Comment": "i586-firefox is earlier than 0:47.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20161630003",
|
|
"Comment": "rpm-build-firefox is earlier than 0:47.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |