471 lines
23 KiB
JSON
471 lines
23 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20151584",
|
|
"Version": "oval:org.altlinux.errata:def:20151584",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2015-1584: package `thunderbird` update to version 38.0.1-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch c9f2"
|
|
],
|
|
"Products": [
|
|
"ALT SPWorkstation",
|
|
"ALT SPServer"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2015-1584",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2015-1584",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09884",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09884",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09885",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09885",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09886",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09886",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09888",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09888",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09889",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09889",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09890",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09890",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09893",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09893",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09894",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09894",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09895",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09895",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09900",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09900",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09901",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09901",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09902",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09902",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2021-03335",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2021-03335",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2011-3079",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2011-3079",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-8634",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8634",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-8638",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8638",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-8639",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-8639",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0801",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0801",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0807",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0807",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0815",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0815",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0816",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0816",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0822",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0822",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0827",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0827",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0831",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0831",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-0836",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-0836",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2708",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2708",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2710",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2710",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2713",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2713",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2015-2716",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2015-2716",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades thunderbird to version 38.0.1-alt1. \nSecurity Fix(es):\n\n * BDU:2015-09884: Уязвимости браузера Firefox, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2015-09885: Уязвимости браузера Firefox ESR, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2015-09886: Уязвимости почтового клиента Thunderbird, позволяющие удалённому злоумышленнику вызвать отказ в обслуживании\n\n * BDU:2015-09888: Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2015-09889: Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2015-09890: Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2015-09893: Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику подделать межсайтовые запросы\n\n * BDU:2015-09894: Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику подделать межсайтовые запросы\n\n * BDU:2015-09895: Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику подделать межсайтовые запросы\n\n * BDU:2015-09900: Уязвимость браузера Firefox, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2015-09901: Уязвимость браузера Firefox ESR, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2015-09902: Уязвимость почтового клиента Thunderbird, позволяющая удалённому злоумышленнику выполнить произвольный JavaScript-код\n\n * BDU:2021-03335: Уязвимость браузера Mozilla Firefox, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2011-3079: The Inter-process Communication (IPC) implementation in Google Chrome before 18.0.1025.168, as used in Mozilla Firefox before 38.0 and other products, does not properly validate messages, which has unspecified impact and attack vectors.\n\n * CVE-2014-8634: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2014-8638: The navigator.sendBeacon implementation in Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 omits the CORS Origin header, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site.\n\n * CVE-2014-8639: Mozilla Firefox before 35.0, Firefox ESR 31.x before 31.4, Thunderbird before 31.4, and SeaMonkey before 2.32 do not properly interpret Set-Cookie headers within responses that have a 407 (aka Proxy Authentication Required) status code, which allows remote HTTP proxy servers to conduct session fixation attacks by providing a cookie name that corresponds to the session cookie of the origin server.\n\n * CVE-2015-0801: Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to bypass the Same Origin Policy and execute arbitrary JavaScript code with chrome privileges via vectors involving anchor navigation, a similar issue to CVE-2015-0818.\n\n * CVE-2015-0807: The navigator.sendBeacon implementation in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 processes HTTP 30x status codes for redirects after a preflight request has occurred, which allows remote attackers to bypass intended CORS access-control checks and conduct cross-site request forgery (CSRF) attacks via a crafted web site, a similar issue to CVE-2014-8638.\n\n * CVE-2015-0815: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-0816: Mozilla Firefox before 37.0, Firefox ESR 31.x before 31.6, and Thunderbird before 31.6 do not properly restrict resource: URLs, which makes it easier for remote attackers to execute arbitrary JavaScript code with chrome privileges by leveraging the ability to bypass the Same Origin Policy, as demonstrated by the resource: URL associated with PDF.js.\n\n * CVE-2015-0822: The Form Autocompletion feature in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to read arbitrary files via crafted JavaScript code.\n\n * CVE-2015-0827: Heap-based buffer overflow in the mozilla::gfx::CopyRect function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to obtain sensitive information from uninitialized process memory via a malformed SVG graphic.\n\n * CVE-2015-0831: Use-after-free vulnerability in the mozilla::dom::IndexedDB::IDBObjectStore::CreateIndex function in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via crafted content that is improperly handled during IndexedDB index creation.\n\n * CVE-2015-0836: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 36.0, Firefox ESR 31.x before 31.5, and Thunderbird before 31.5 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2708: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2015-2710: Heap-based buffer overflow in the SVGTextFrame class in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code via crafted SVG graphics data in conjunction with a crafted Cascading Style Sheets (CSS) token sequence.\n\n * CVE-2015-2713: Use-after-free vulnerability in the SetBreaks function in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption) via a document containing crafted text in conjunction with a Cascading Style Sheets (CSS) token sequence containing properties related to vertical text.\n\n * CVE-2015-2716: Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2015-07-01"
|
|
},
|
|
"Updated": {
|
|
"Date": "2015-07-01"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-09884",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09884",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09885",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09885",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09886",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09886",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09888",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09888",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09889",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09889",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09890",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09890",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09893",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09893",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09894",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09894",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09895",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09895",
|
|
"Impact": "Low",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09900",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09900",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09901",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09901",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09902",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09902",
|
|
"Impact": "High",
|
|
"Public": "20150331"
|
|
},
|
|
{
|
|
"ID": "BDU:2021-03335",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://bdu.fstec.ru/vul/2021-03335",
|
|
"Impact": "High",
|
|
"Public": "20150512"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2011-3079",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2011-3079",
|
|
"Impact": "Critical",
|
|
"Public": "20120501"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-8634",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8634",
|
|
"Impact": "High",
|
|
"Public": "20150114"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-8638",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8638",
|
|
"Impact": "Low",
|
|
"Public": "20150114"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-8639",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-8639",
|
|
"Impact": "Low",
|
|
"Public": "20150114"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0801",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0801",
|
|
"Impact": "High",
|
|
"Public": "20150401"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0807",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-352",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0807",
|
|
"Impact": "Low",
|
|
"Public": "20150401"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0815",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0815",
|
|
"Impact": "High",
|
|
"Public": "20150401"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0816",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-264",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0816",
|
|
"Impact": "Low",
|
|
"Public": "20150401"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0822",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-200",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0822",
|
|
"Impact": "Low",
|
|
"Public": "20150225"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0827",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0827",
|
|
"Impact": "Low",
|
|
"Public": "20150225"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0831",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0831",
|
|
"Impact": "Low",
|
|
"Public": "20150225"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-0836",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-0836",
|
|
"Impact": "High",
|
|
"Public": "20150225"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2708",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-noinfo",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2708",
|
|
"Impact": "High",
|
|
"Public": "20150514"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2710",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2710",
|
|
"Impact": "Low",
|
|
"Public": "20150514"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2713",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "NVD-CWE-Other",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2713",
|
|
"Impact": "Low",
|
|
"Public": "20150514"
|
|
},
|
|
{
|
|
"ID": "CVE-2015-2716",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2015-2716",
|
|
"Impact": "High",
|
|
"Public": "20150514"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:spworkstation:8.4",
|
|
"cpe:/o:alt:spserver:8.4"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584001",
|
|
"Comment": "rpm-build-thunderbird is earlier than 0:38.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584002",
|
|
"Comment": "thunderbird is earlier than 0:38.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584003",
|
|
"Comment": "thunderbird-devel is earlier than 0:38.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584004",
|
|
"Comment": "thunderbird-enigmail is earlier than 0:38.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584005",
|
|
"Comment": "thunderbird-google-calendar is earlier than 0:38.0.1-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20151584006",
|
|
"Comment": "thunderbird-lightning is earlier than 0:38.0.1-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |