2024-06-28 13:17:52 +00:00

291 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20201969",
"Version": "oval:org.altlinux.errata:def:20201969",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-1969: package `chromium` update to version 81.0.4044.138-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-1969",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1969",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-03744",
"RefURL": "https://bdu.fstec.ru/vul/2020-03744",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03745",
"RefURL": "https://bdu.fstec.ru/vul/2020-03745",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03746",
"RefURL": "https://bdu.fstec.ru/vul/2020-03746",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03747",
"RefURL": "https://bdu.fstec.ru/vul/2020-03747",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03748",
"RefURL": "https://bdu.fstec.ru/vul/2020-03748",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03749",
"RefURL": "https://bdu.fstec.ru/vul/2020-03749",
"Source": "BDU"
},
{
"RefID": "BDU:2020-03849",
"RefURL": "https://bdu.fstec.ru/vul/2020-03849",
"Source": "BDU"
},
{
"RefID": "CVE-2020-6458",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6459",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6460",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6461",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6462",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6463",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6464",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
"Source": "CVE"
},
{
"RefID": "CVE-2020-6831",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 81.0.4044.138-alt1. \nSecurity Fix(es):\n\n * BDU:2020-03744: Уязвимость модуля PDFium браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03745: Уязвимость механизма онлайн оплаты браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03746: Уязвимость механизма форматирования URL-адресов браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных\n\n * BDU:2020-03747: Уязвимость хранилища браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03748: Уязвимость планировщика заданий браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03749: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2020-03849: Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2020-6458: Out of bounds read and write in PDFium in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file.\n\n * CVE-2020-6459: Use after free in payments in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6460: Insufficient data validation in URL formatting in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to perform domain spoofing via a crafted domain name.\n\n * CVE-2020-6461: Use after free in storage in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6462: Use after free in task scheduling in Google Chrome prior to 81.0.4044.129 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2020-6463: Use after free in ANGLE in Google Chrome prior to 81.0.4044.122 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6464: Type confusion in Blink in Google Chrome prior to 81.0.4044.138 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2020-6831: A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR \u003c 68.8, Firefox \u003c 76, and Thunderbird \u003c 68.8.0.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-05-15"
},
"Updated": {
"Date": "2020-05-15"
},
"BDUs": [
{
"ID": "BDU:2020-03744",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-03744",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03745",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03745",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "BDU:2020-03746",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-399",
"Href": "https://bdu.fstec.ru/vul/2020-03746",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "BDU:2020-03747",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03747",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03748",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2020-03748",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03749",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://bdu.fstec.ru/vul/2020-03749",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "BDU:2020-03849",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2020-03849",
"Impact": "Critical",
"Public": "20200526"
}
],
"CVEs": [
{
"ID": "CVE-2020-6458",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6458",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6459",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6459",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6460",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6460",
"Impact": "Low",
"Public": "20200521"
},
{
"ID": "CVE-2020-6461",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6461",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6462",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6462",
"Impact": "Critical",
"Public": "20200521"
},
{
"ID": "CVE-2020-6463",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6463",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6464",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6464",
"Impact": "High",
"Public": "20200521"
},
{
"ID": "CVE-2020-6831",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-6831",
"Impact": "Critical",
"Public": "20200526"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20201969001",
"Comment": "chromium is earlier than 0:81.0.4044.138-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201969002",
"Comment": "chromium-gnome is earlier than 0:81.0.4044.138-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20201969003",
"Comment": "chromium-kde is earlier than 0:81.0.4044.138-alt1"
}
]
}
]
}
}
]
}