406 lines
20 KiB
JSON
406 lines
20 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20131334",
|
|
"Version": "oval:org.altlinux.errata:def:20131334",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2013-1334: package `thunderbird` update to version 24.2.0-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2013-1334",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2013-1334",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-06136",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-06136",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-06137",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-06137",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-06138",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-06138",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-06139",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-06139",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07110",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07110",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07111",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07111",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07112",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07112",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09076",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09076",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09077",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09077",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09078",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09078",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09079",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09079",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09080",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09080",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09081",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09081",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09082",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09082",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-2566",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-2566",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5609",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5613",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5615",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5615",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5616",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-5618",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6629",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6629",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6671",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-6673",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-6673",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades thunderbird to version 24.2.0-alt1. \nSecurity Fix(es):\n\n * BDU:2015-06136: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06137: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06138: Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-06139: Множественные уязвимости пакета libjpeg-turbo-static-1.2.1 операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07110: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07111: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-07112: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09076: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09077: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09078: Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09079: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09080: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09081: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * BDU:2015-09082: Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации\n\n * CVE-2013-2566: The RC4 algorithm, as used in the TLS protocol and SSL protocol, has many single-byte biases, which makes it easier for remote attackers to conduct plaintext-recovery attacks via statistical analysis of ciphertext in a large number of sessions that use the same plaintext.\n\n * CVE-2013-5609: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2013-5613: Use-after-free vulnerability in the PresShell::DispatchSynthMouseMove function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors involving synthetic mouse movement, related to the RestyleManager::GetHoverGeneration function.\n\n * CVE-2013-5615: The JavaScript implementation in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 does not properly enforce certain typeset restrictions on the generation of GetElementIC typed array stubs, which has unspecified impact and remote attack vectors.\n\n * CVE-2013-5616: Use-after-free vulnerability in the nsEventListenerManager::HandleEventSubType function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via vectors related to mListeners event listeners.\n\n * CVE-2013-5618: Use-after-free vulnerability in the nsNodeUtils::LastRelease function in the table-editing user interface in the editor component in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code by triggering improper garbage collection.\n\n * CVE-2013-6629: The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image.\n\n * CVE-2013-6671: The nsGfxScrollFrameInner::IsLTR function in Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 allows remote attackers to execute arbitrary code via crafted use of JavaScript code for ordered list elements.\n\n * CVE-2013-6673: Mozilla Firefox before 26.0, Firefox ESR 24.x before 24.2, Thunderbird before 24.2, and SeaMonkey before 2.23 do not recognize a user's removal of trust from an EV X.509 certificate, which makes it easier for man-in-the-middle attackers to spoof SSL servers in opportunistic circumstances via a valid certificate that is unacceptable to the user.\n\n * MFSA 2013-10: description unavailable\n\n * MFSA 2013-11: description unavailable",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2013-12-28"
|
|
},
|
|
"Updated": {
|
|
"Date": "2013-12-28"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-06136",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-06136",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-06137",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-06137",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-06138",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-06138",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-06139",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-06139",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07110",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07110",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07111",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07111",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07112",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07112",
|
|
"Impact": "Low",
|
|
"Public": "20131209"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09076",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09076",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09077",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09077",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09078",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09078",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09079",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09079",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09080",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09080",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09081",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09081",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09082",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09082",
|
|
"Impact": "Low",
|
|
"Public": "20131210"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-2566",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-2566",
|
|
"Impact": "Low",
|
|
"Public": "20130315"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5609",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5609",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5613",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5613",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5615",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5615",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5616",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5616",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-5618",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-416",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-5618",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-6629",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6629",
|
|
"Impact": "Low",
|
|
"Public": "20131119"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-6671",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-94",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6671",
|
|
"Impact": "Critical",
|
|
"Public": "20131211"
|
|
},
|
|
{
|
|
"ID": "CVE-2013-6673",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-6673",
|
|
"Impact": "Low",
|
|
"Public": "20131211"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334001",
|
|
"Comment": "rpm-build-thunderbird is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334002",
|
|
"Comment": "thunderbird is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334003",
|
|
"Comment": "thunderbird-calendar-timezones is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334004",
|
|
"Comment": "thunderbird-devel is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334005",
|
|
"Comment": "thunderbird-enigmail is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334006",
|
|
"Comment": "thunderbird-google-calendar is earlier than 0:24.2.0-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20131334007",
|
|
"Comment": "thunderbird-lightning is earlier than 0:24.2.0-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |