vuln-list-alt/oval/c9f2/ALT-PU-2018-2278/definitions.json
2024-12-12 21:07:30 +00:00

1002 lines
51 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20182278",
"Version": "oval:org.altlinux.errata:def:20182278",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-2278: package `chromium` update to version 68.0.3440.84-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-2278",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2278",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-04382",
"RefURL": "https://bdu.fstec.ru/vul/2019-04382",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04387",
"RefURL": "https://bdu.fstec.ru/vul/2019-04387",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04456",
"RefURL": "https://bdu.fstec.ru/vul/2019-04456",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04457",
"RefURL": "https://bdu.fstec.ru/vul/2019-04457",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04458",
"RefURL": "https://bdu.fstec.ru/vul/2019-04458",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04459",
"RefURL": "https://bdu.fstec.ru/vul/2019-04459",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04460",
"RefURL": "https://bdu.fstec.ru/vul/2019-04460",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04461",
"RefURL": "https://bdu.fstec.ru/vul/2019-04461",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04462",
"RefURL": "https://bdu.fstec.ru/vul/2019-04462",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04463",
"RefURL": "https://bdu.fstec.ru/vul/2019-04463",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04464",
"RefURL": "https://bdu.fstec.ru/vul/2019-04464",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04465",
"RefURL": "https://bdu.fstec.ru/vul/2019-04465",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04466",
"RefURL": "https://bdu.fstec.ru/vul/2019-04466",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04467",
"RefURL": "https://bdu.fstec.ru/vul/2019-04467",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04468",
"RefURL": "https://bdu.fstec.ru/vul/2019-04468",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04469",
"RefURL": "https://bdu.fstec.ru/vul/2019-04469",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04478",
"RefURL": "https://bdu.fstec.ru/vul/2019-04478",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04479",
"RefURL": "https://bdu.fstec.ru/vul/2019-04479",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04480",
"RefURL": "https://bdu.fstec.ru/vul/2019-04480",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04481",
"RefURL": "https://bdu.fstec.ru/vul/2019-04481",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04482",
"RefURL": "https://bdu.fstec.ru/vul/2019-04482",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04483",
"RefURL": "https://bdu.fstec.ru/vul/2019-04483",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04484",
"RefURL": "https://bdu.fstec.ru/vul/2019-04484",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04485",
"RefURL": "https://bdu.fstec.ru/vul/2019-04485",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04486",
"RefURL": "https://bdu.fstec.ru/vul/2019-04486",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04487",
"RefURL": "https://bdu.fstec.ru/vul/2019-04487",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04488",
"RefURL": "https://bdu.fstec.ru/vul/2019-04488",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04489",
"RefURL": "https://bdu.fstec.ru/vul/2019-04489",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04490",
"RefURL": "https://bdu.fstec.ru/vul/2019-04490",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04491",
"RefURL": "https://bdu.fstec.ru/vul/2019-04491",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04492",
"RefURL": "https://bdu.fstec.ru/vul/2019-04492",
"Source": "BDU"
},
{
"RefID": "CVE-2018-16064",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-16064",
"Source": "CVE"
},
{
"RefID": "CVE-2018-17460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17460",
"Source": "CVE"
},
{
"RefID": "CVE-2018-17461",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17461",
"Source": "CVE"
},
{
"RefID": "CVE-2018-4117",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-4117",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6044",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6044",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6150",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6150",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6151",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6151",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6152",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6152",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6153",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6153",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6154",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6155",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6155",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6156",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6157",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6157",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6158",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6159",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6159",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6160",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6161",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6161",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6162",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6162",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6163",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6163",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6164",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6164",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6165",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6165",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6166",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6167",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6167",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6168",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6168",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6169",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6169",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6170",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6170",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6171",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6171",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6172",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6172",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6173",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6173",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6174",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6174",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6175",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6175",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6176",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6176",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6177",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6177",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6178",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6178",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6179",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6179",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 68.0.3440.84-alt1. \nSecurity Fix(es):\n\n * BDU:2019-04382: Уязвимость модуля отображения веб-страниц WebKitGTK+, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04387: Уязвимость браузера Google Chrome, связанная с ошибками управления привилегиями, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04456: Уязвимость компонента URL Formatter браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04457: Уязвимость компонента URL Formatter браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04458: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04459: Уязвимость браузера Google Chrome, связанная с отсутствием тайм-аута на разрешение установки расширений Chrome, позволяющая нарушителю инициировать установку вредоносного расширения Chrome\n\n * BDU:2019-04460: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04461: Уязвимость компонента WebBluetooth браузера Google Chrome, позволяющая нарушителю инициировать установку вредоносного расширения Chrome и получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04462: Уязвимость компонента URL Formatter браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04463: Уязвимость компонента URL Formatter браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04464: Уязвимость библиотеки SwiftShader браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04465: Уязвимость компонента URL Formatter браузера Google Chrome, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04466: Уязвимость функции chrome.downloads.open() браузера Google Chrome, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04467: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04468: Уязвимость компонента DevTools браузера Google Chrome, позволяющая нарушителю осуществить подмену пользовательского интерфейса\n\n * BDU:2019-04469: Уязвимость браузера Google Chrome, связанная с ошибками в настройках безопасности, позволяющая нарушителю получить несанкционированный доступ к локальным файлам\n\n * BDU:2019-04478: Уязвимость реализации механизма CORS браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04479: Уязвимость компонента DevTools браузера Google Chrome для операционных систем Windows, Мас ОS, Сhrome OS и Linux, позволяющая нарушителю убедить пользователя установить вредоносное расширение\n\n * BDU:2019-04480: Уязвимость реализации бэкэнда Page.downloadBehavior браузера Google Chrome, позволяющая нарушителю убедить пользователя установить вредоносное расширение\n\n * BDU:2019-04481: Уязвимость графического движка Skia браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04482: Уязвимость компонента WebGL браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04483: Уязвимость компонента VP8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04484: Уязвимость реализации WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04485: Уязвимость реализации WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04486: Уязвимость компонента Oilpan браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04487: Уязвимость компонента ServiceWorker браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04488: Уязвимость компонента Blink браузера Google Chrome, позволяющая нарушителю обойти правило ограничения домена и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04489: Уязвимость компонента WebGL браузера Google Chrome для операционных систем Мас ОS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2019-04490: Уязвимость браузера Google Chrome, связанная с неправильной обработкой ошибочных символов в URL Formatter, позволяющая нарушителю выполнить подмену домена\n\n * BDU:2019-04491: Уязвимость компонента Blink браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04492: Уязвимость компонента Navigation браузера Google Chrome, позволяющая нарушителю подделать содержимое омнибокса (строки URL)\n\n * CVE-2018-16064: Insufficient data validation in Extensions API in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2018-17460: Insufficient data validation in filesystem URIs in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2018-17461: An out of bounds read in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.\n\n * CVE-2018-4117: An issue was discovered in certain Apple products. iOS before 11.3 is affected. Safari before 11.1 is affected. iCloud before 7.4 on Windows is affected. iTunes before 12.7.4 on Windows is affected. watchOS before 4.3 is affected. The issue involves the fetch API in the \"WebKit\" component. It allows remote attackers to bypass the Same Origin Policy and obtain sensitive information via a crafted web site.\n\n * CVE-2018-6044: Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-16064. Reason: This candidate is a reservation duplicate of CVE-2018-16064. Notes: All CVE users should reference CVE-2018-16064 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage\n\n * CVE-2018-6150: Incorrect handling of CORS in ServiceWorker in Google Chrome prior to 66.0.3359.117 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2018-6151: Bad cast in DevTools in Google Chrome on Win, Linux, Mac, Chrome OS prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to perform an out of bounds memory read via a crafted Chrome Extension.\n\n * CVE-2018-6152: The implementation of the Page.downloadBehavior backend unconditionally marked downloaded files as safe, regardless of file type in Google Chrome prior to 66.0.3359.117 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted HTML page and user interaction.\n\n * CVE-2018-6153: A precision error in Skia in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory write via a crafted HTML page.\n\n * CVE-2018-6154: Insufficient data validation in WebGL in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6155: Incorrect handling of frames in the VP8 parser in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.\n\n * CVE-2018-6156: Incorect derivation of a packet length in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.\n\n * CVE-2018-6157: Type confusion in WebRTC in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted video file.\n\n * CVE-2018-6158: A race condition in Oilpan in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6159: Insufficient policy enforcement in ServiceWorker in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2018-6160: JavaScript alert handling in Prompts in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2018-6161: Insufficient policy enforcement in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2018-6162: Improper deserialization in WebGL in Google Chrome on Mac prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6163: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6164: Insufficient origin checks for CSS content in Blink in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2018-6165: Incorrect handling of reloads in Navigation in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2018-6166: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6167: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6168: Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.\n\n * CVE-2018-6169: Lack of timeout on extension install prompt in Extensions in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to trigger installation of an unwanted extension via a crafted HTML page.\n\n * CVE-2018-6170: A bad cast in PDFium in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2018-6171: Use after free in Bluetooth in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to obtain potentially sensitive information from process memory via a crafted Chrome Extension.\n\n * CVE-2018-6172: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6173: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6174: Integer overflows in Swiftshader in Google Chrome prior to 68.0.3440.75 potentially allowed a remote attacker to execute arbitrary code via a crafted HTML page.\n\n * CVE-2018-6175: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6176: Insufficient file type enforcement in Extensions API in Google Chrome prior to 68.0.3440.75 allowed a remote attacker who had compromised the renderer process to perform privilege escalation via a crafted Chrome Extension.\n\n * CVE-2018-6177: Information leak in media engine in Google Chrome prior to 68.0.3440.75 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2018-6178: Eliding from the wrong side in an infobar in DevTools in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to Hide Chrome Security UI via a crafted Chrome Extension.\n\n * CVE-2018-6179: Insufficient enforcement of file access permission in the activeTab case in Extensions in Google Chrome prior to 68.0.3440.75 allowed an attacker who convinced a user to install a malicious extension to access files on the local file system via a crafted Chrome Extension.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-09-05"
},
"Updated": {
"Date": "2018-09-05"
},
"BDUs": [
{
"ID": "BDU:2019-04382",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04382",
"Impact": "Low",
"Public": "20180404"
},
{
"ID": "BDU:2019-04387",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-04387",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04456",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04456",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04457",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04457",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04458",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04458",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04459",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04459",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04460",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04460",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04461",
"CVSS": "AV:A/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04461",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04462",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04462",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04463",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04463",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04464",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-04464",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04465",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04465",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04466",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04466",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04467",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04467",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04468",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2019-04468",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04469",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04469",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04478",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04478",
"Impact": "Low",
"Public": "20180417"
},
{
"ID": "BDU:2019-04479",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04479",
"Impact": "High",
"Public": "20180417"
},
{
"ID": "BDU:2019-04480",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-434",
"Href": "https://bdu.fstec.ru/vul/2019-04480",
"Impact": "Critical",
"Public": "20180417"
},
{
"ID": "BDU:2019-04481",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04481",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04482",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-04482",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04483",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04483",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04484",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-04484",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04485",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-04485",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04486",
"CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2019-04486",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04487",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04487",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04488",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04488",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04489",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-502",
"Href": "https://bdu.fstec.ru/vul/2019-04489",
"Impact": "High",
"Public": "20180724"
},
{
"ID": "BDU:2019-04490",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2019-04490",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04491",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04491",
"Impact": "Low",
"Public": "20180724"
},
{
"ID": "BDU:2019-04492",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2019-04492",
"Impact": "Low",
"Public": "20180724"
}
],
"CVEs": [
{
"ID": "CVE-2018-16064",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-16064",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-17460",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17460",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-17461",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17461",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-4117",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-4117",
"Impact": "Low",
"Public": "20180403"
},
{
"ID": "CVE-2018-6044",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6044",
"Impact": "None",
"Public": "20211102"
},
{
"ID": "CVE-2018-6150",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6150",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6151",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6151",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6152",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-434",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6152",
"Impact": "Critical",
"Public": "20181204"
},
{
"ID": "CVE-2018-6153",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6153",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6154",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6154",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6155",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6155",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6156",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6156",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6157",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6157",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6158",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6158",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6159",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6159",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6160",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6160",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6161",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6161",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6162",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6162",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6163",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6163",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6164",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6164",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6165",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6165",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6166",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6166",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6167",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6167",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6168",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6168",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6169",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6169",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6170",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6170",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6171",
"CVSS": "AV:A/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6171",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6172",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6172",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6173",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6173",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6174",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6174",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6175",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6175",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6176",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6176",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6177",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6177",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6178",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-1021",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6178",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6179",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6179",
"Impact": "Low",
"Public": "20190109"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:4001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20182278001",
"Comment": "chromium is earlier than 0:68.0.3440.84-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182278002",
"Comment": "chromium-gnome is earlier than 0:68.0.3440.84-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20182278003",
"Comment": "chromium-kde is earlier than 0:68.0.3440.84-alt1"
}
]
}
]
}
}
]
}