499 lines
24 KiB
JSON
499 lines
24 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20171713",
|
|
"Version": "oval:org.altlinux.errata:def:20171713",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2017-1713: package `chromium` update to version 59.0.3071.86-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2017-1713",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-1713",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02631",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02631",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02632",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02632",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02633",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02633",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02634",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02634",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02635",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02635",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02661",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02661",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02662",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02662",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02663",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02663",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02664",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02664",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02665",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02665",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02666",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02666",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02667",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02667",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02681",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02681",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02682",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02682",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5070",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5070",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5071",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5071",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5072",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5072",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5073",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5073",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5074",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5074",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5075",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5075",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5076",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5076",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5077",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5077",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5078",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5078",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5079",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5079",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5080",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5080",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5081",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5081",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5082",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5082",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5083",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5083",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5085",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5085",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-5086",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5086",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades chromium to version 59.0.3071.86-alt1. \nSecurity Fix(es):\n\n * BDU:2017-02631: Уязвимость реализации Omnibox браузера Google Chrome, позволяющая нарушителю осуществить подмену домена\n\n * BDU:2017-02632: Уязвимость компонента Bookmarks браузера Google Chrome, позволяющая нарушителю выполнить сценарий JavaScript на страницах chrome://\n\n * BDU:2017-02633: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю отображать пользовательский интерфейс на вкладке, не контролируемой нарушителем\n\n * BDU:2017-02634: Уязвимость механизма автозаполнения данных браузера Google Chrome, позволяющая нарушителю выполнить чтение за пределами памяти\n\n * BDU:2017-02635: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю отображать пользовательский интерфейс на вкладке, не контролируемой нарушителем\n\n * BDU:2017-02661: Уязвимость реализации Omnibox браузера Google Chrome, позволяющая нарушителю осуществить подмену домена\n\n * BDU:2017-02662: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю получить значения фрагментов URL\n\n * BDU:2017-02663: Уязвимость компонента Apps Bluetooth браузера Google Chrome, позволяющая нарушителю выполнить чтение за пределами памяти\n\n * BDU:2017-02664: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю выполнить чтение за пределами памяти\n\n * BDU:2017-02665: Уязвимость реализации Omnibox браузера Google Chrome, позволяющая нарушителю осуществить подмену домена\n\n * BDU:2017-02666: Уязвимость ядра JavaScript V8 браузера Google Chrome, позволяющая нарушителю выполнить чтение за пределами памяти\n\n * BDU:2017-02667: Уязвимость ядра JavaScript V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код в изолированной среде\n\n * BDU:2017-02681: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю выполнять произвольные команды\n\n * BDU:2017-02682: Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю выполнить чтение за границами памяти приложения\n\n * CVE-2017-5070: Type confusion in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2017-5071: Insufficient validation of untrusted input in V8 in Google Chrome prior to 59.0.3071.86 for Linux, Windows and Mac, and 59.0.3071.92 for Android allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2017-5072: Inappropriate implementation in Omnibox in Google Chrome prior to 59.0.3071.92 for Android allowed a remote attacker to perform domain spoofing with RTL characters via a crafted URL page.\n\n * CVE-2017-5073: Use after free in print preview in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2017-5074: A use after free in Chrome Apps in Google Chrome prior to 59.0.3071.86 for Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page, related to Bluetooth.\n\n * CVE-2017-5075: Inappropriate implementation in CSP reporting in Blink in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to obtain the value of url fragments via a crafted HTML page.\n\n * CVE-2017-5076: Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.\n\n * CVE-2017-5077: Insufficient validation of untrusted input in Skia in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac, and 59.0.3071.92 for Android, allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2017-5078: Insufficient validation of untrusted input in Blink's mailto: handling in Google Chrome prior to 59.0.3071.86 for Linux, Windows, and Mac allowed a remote attacker to perform command injection via a crafted HTML page, a similar issue to CVE-2004-0121. For example, characters such as * have an incorrect interaction with xdg-email in xdg-utils, and a space character can be used in front of a command-line argument.\n\n * CVE-2017-5079: Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.\n\n * CVE-2017-5080: A use after free in credit card autofill in Google Chrome prior to 59.0.3071.86 for Linux and Windows allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2017-5081: Lack of verification of an extension's locale folder in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed an attacker with local write access to modify extensions by modifying extension files.\n\n * CVE-2017-5082: Failure to take advantage of available mitigations in credit card autofill in Google Chrome prior to 59.0.3071.92 for Android allowed a local attacker to take screen shots of credit card information via a crafted HTML page.\n\n * CVE-2017-5083: Inappropriate implementation in Blink in Google Chrome prior to 59.0.3071.86 for Mac, Windows, and Linux, and 59.0.3071.92 for Android, allowed a remote attacker to display UI on a non attacker controlled tab via a crafted HTML page.\n\n * CVE-2017-5085: Inappropriate implementation in Bookmarks in Google Chrome prior to 59 for iOS allowed a remote attacker who convinced the user to perform certain operations to run JavaScript on chrome:// pages via a crafted bookmark.\n\n * CVE-2017-5086: Insufficient Policy Enforcement in Omnibox in Google Chrome prior to 59.0.3071.86 for Windows and Mac allowed a remote attacker to perform domain spoofing via IDN homographs in a crafted domain name.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2017-06-12"
|
|
},
|
|
"Updated": {
|
|
"Date": "2017-06-12"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2017-02631",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02631",
|
|
"Impact": "Low",
|
|
"Public": "20170605"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02632",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02632",
|
|
"Impact": "Low",
|
|
"Public": "20170605"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02633",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02633",
|
|
"Impact": "Low",
|
|
"Public": "20170605"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02634",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02634",
|
|
"Impact": "High",
|
|
"Public": "20170605"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02635",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02635",
|
|
"Impact": "Low",
|
|
"Public": "20170605"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02661",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02661",
|
|
"Impact": "Low",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02662",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02662",
|
|
"Impact": "Low",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02663",
|
|
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02663",
|
|
"Impact": "High",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02664",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02664",
|
|
"Impact": "High",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02665",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02665",
|
|
"Impact": "Low",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02666",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02666",
|
|
"Impact": "Low",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02667",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-704",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02667",
|
|
"Impact": "High",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02681",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-77",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02681",
|
|
"Impact": "High",
|
|
"Public": "20171026"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02682",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02682",
|
|
"Impact": "High",
|
|
"Public": "20171026"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2017-5070",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-843",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5070",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5071",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5071",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5072",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5072",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5073",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5073",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5074",
|
|
"CVSS": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5074",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5075",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5075",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5076",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5076",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5077",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-125",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5077",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5078",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5078",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5079",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5079",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5080",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5080",
|
|
"Impact": "High",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5081",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5081",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5082",
|
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5082",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5083",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5083",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5085",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
|
"CWE": "CWE-79",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5085",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-5086",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5086",
|
|
"Impact": "Low",
|
|
"Public": "20171027"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171713001",
|
|
"Comment": "chromium is earlier than 0:59.0.3071.86-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171713002",
|
|
"Comment": "chromium-gnome is earlier than 0:59.0.3071.86-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20171713003",
|
|
"Comment": "chromium-kde is earlier than 0:59.0.3071.86-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |