2024-06-28 13:17:52 +00:00

361 lines
17 KiB
JSON

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20161433",
"Version": "oval:org.altlinux.errata:def:20161433",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2016-1433: package `firefox` update to version 46.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2016-1433",
"RefURL": "https://errata.altlinux.org/ALT-PU-2016-1433",
"Source": "ALTPU"
},
{
"RefID": "BDU:2016-01138",
"RefURL": "https://bdu.fstec.ru/vul/2016-01138",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01147",
"RefURL": "https://bdu.fstec.ru/vul/2016-01147",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01148",
"RefURL": "https://bdu.fstec.ru/vul/2016-01148",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01149",
"RefURL": "https://bdu.fstec.ru/vul/2016-01149",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01150",
"RefURL": "https://bdu.fstec.ru/vul/2016-01150",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01152",
"RefURL": "https://bdu.fstec.ru/vul/2016-01152",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01153",
"RefURL": "https://bdu.fstec.ru/vul/2016-01153",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01156",
"RefURL": "https://bdu.fstec.ru/vul/2016-01156",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01157",
"RefURL": "https://bdu.fstec.ru/vul/2016-01157",
"Source": "BDU"
},
{
"RefID": "BDU:2016-01158",
"RefURL": "https://bdu.fstec.ru/vul/2016-01158",
"Source": "BDU"
},
{
"RefID": "CVE-2016-2804",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2806",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2806",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2807",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2807",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2808",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2808",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2811",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2812",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2814",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2814",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2817",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817",
"Source": "CVE"
},
{
"RefID": "CVE-2016-2820",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820",
"Source": "CVE"
},
{
"RefID": "CVE-2016-9905",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-9905",
"Source": "CVE"
}
],
"Description": "This update upgrades firefox to version 46.0-alt1. \nSecurity Fix(es):\n\n * BDU:2016-01138: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01147: Уязвимость браузера Firefox, позволяющая нарушителю внести изменения в настройки общего доступа\n\n * BDU:2016-01148: Уязвимость браузера Firefox, позволяющая нарушителю проводить UXSS-атаки\n\n * BDU:2016-01149: Уязвимость браузера Firefox, позволяющая нарушителю обойти защитный механизм CSP\n\n * BDU:2016-01150: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01152: Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01153: Уязвимость браузера Firefox, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2016-01156: Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01157: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2016-01158: Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2016-2804: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2806: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0 and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2807: Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.\n\n * CVE-2016-2808: The watch implementation in the JavaScript engine in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code or cause a denial of service (generation-count overflow, out-of-bounds HashMap write access, and application crash) via a crafted web site.\n\n * CVE-2016-2811: Use-after-free vulnerability in the ServiceWorkerInfo class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code via vectors related to the BeginReading method.\n\n * CVE-2016-2812: Race condition in the get implementation in the ServiceWorkerManager class in the Service Worker subsystem in Mozilla Firefox before 46.0 allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) via a crafted web site.\n\n * CVE-2016-2814: Heap-based buffer overflow in the stagefright::SampleTable::parseSampleCencInfo function in libstagefright in Mozilla Firefox before 46.0, Firefox ESR 38.x before 38.8, and Firefox ESR 45.x before 45.1 allows remote attackers to execute arbitrary code via crafted CENC offsets that lead to mismanagement of the sizes table.\n\n * CVE-2016-2816: Mozilla Firefox before 46.0 allows remote attackers to bypass the Content Security Policy (CSP) protection mechanism via the multipart/x-mixed-replace content type.\n\n * CVE-2016-2817: The WebExtension sandbox feature in browser/components/extensions/ext-tabs.js in Mozilla Firefox before 46.0 does not properly restrict principal inheritance during chrome.tabs.create and chrome.tabs.update API calls, which allows remote attackers to conduct Universal XSS (UXSS) attacks via a crafted extension that accesses a (1) javascript: or (2) data: URL.\n\n * CVE-2016-2820: The Firefox Health Reports (aka FHR or about:healthreport) feature in Mozilla Firefox before 46.0 does not properly restrict the origin of events, which makes it easier for remote attackers to modify sharing preferences by leveraging access to the remote-report IFRAME element.\n\n * CVE-2016-9905: A potentially exploitable crash in \"EnumerateSubDocuments\" while adding or removing sub-documents. This vulnerability affects Firefox ESR \u003c 45.6 and Thunderbird \u003c 45.6.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2016-05-01"
},
"Updated": {
"Date": "2016-05-01"
},
"BDUs": [
{
"ID": "BDU:2016-01138",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01138",
"Impact": "Critical",
"Public": "20160430"
},
{
"ID": "BDU:2016-01147",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2016-01147",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01148",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2016-01148",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01149",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CWE": "CWE-284",
"Href": "https://bdu.fstec.ru/vul/2016-01149",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01150",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01150",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01152",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CWE": "CWE-362",
"Href": "https://bdu.fstec.ru/vul/2016-01152",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01153",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2016-01153",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01156",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01156",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "BDU:2016-01157",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01157",
"Impact": "Critical",
"Public": "20160430"
},
{
"ID": "BDU:2016-01158",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2016-01158",
"Impact": "Critical",
"Public": "20160430"
}
],
"CVEs": [
{
"ID": "CVE-2016-2804",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2804",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2806",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2806",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2807",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2807",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2808",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2808",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2811",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "NVD-CWE-Other",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2811",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2812",
"CVSS": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-362",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2812",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2814",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2814",
"Impact": "High",
"Public": "20160430"
},
{
"ID": "CVE-2016-2816",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2816",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "CVE-2016-2817",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"CWE": "CWE-264",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2817",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "CVE-2016-2820",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-2820",
"Impact": "Low",
"Public": "20160430"
},
{
"ID": "CVE-2016-9905",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-9905",
"Impact": "High",
"Public": "20180611"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20161433001",
"Comment": "firefox is earlier than 0:46.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20161433002",
"Comment": "rpm-build-firefox is earlier than 0:46.0-alt1"
}
]
}
]
}
}
]
}