2024-06-28 13:17:52 +00:00

931 lines
45 KiB
JSON
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20181959",
"Version": "oval:org.altlinux.errata:def:20181959",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2018-1959: package `chromium` update to version 67.0.3396.87-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2018-1959",
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-1959",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02430",
"RefURL": "https://bdu.fstec.ru/vul/2019-02430",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04035",
"RefURL": "https://bdu.fstec.ru/vul/2019-04035",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04388",
"RefURL": "https://bdu.fstec.ru/vul/2019-04388",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04389",
"RefURL": "https://bdu.fstec.ru/vul/2019-04389",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04390",
"RefURL": "https://bdu.fstec.ru/vul/2019-04390",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04391",
"RefURL": "https://bdu.fstec.ru/vul/2019-04391",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04392",
"RefURL": "https://bdu.fstec.ru/vul/2019-04392",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04393",
"RefURL": "https://bdu.fstec.ru/vul/2019-04393",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04394",
"RefURL": "https://bdu.fstec.ru/vul/2019-04394",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04395",
"RefURL": "https://bdu.fstec.ru/vul/2019-04395",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04396",
"RefURL": "https://bdu.fstec.ru/vul/2019-04396",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04397",
"RefURL": "https://bdu.fstec.ru/vul/2019-04397",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04398",
"RefURL": "https://bdu.fstec.ru/vul/2019-04398",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04399",
"RefURL": "https://bdu.fstec.ru/vul/2019-04399",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04400",
"RefURL": "https://bdu.fstec.ru/vul/2019-04400",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04427",
"RefURL": "https://bdu.fstec.ru/vul/2019-04427",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04428",
"RefURL": "https://bdu.fstec.ru/vul/2019-04428",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04429",
"RefURL": "https://bdu.fstec.ru/vul/2019-04429",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04430",
"RefURL": "https://bdu.fstec.ru/vul/2019-04430",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04431",
"RefURL": "https://bdu.fstec.ru/vul/2019-04431",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04432",
"RefURL": "https://bdu.fstec.ru/vul/2019-04432",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04433",
"RefURL": "https://bdu.fstec.ru/vul/2019-04433",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04434",
"RefURL": "https://bdu.fstec.ru/vul/2019-04434",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04435",
"RefURL": "https://bdu.fstec.ru/vul/2019-04435",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04436",
"RefURL": "https://bdu.fstec.ru/vul/2019-04436",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04437",
"RefURL": "https://bdu.fstec.ru/vul/2019-04437",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04438",
"RefURL": "https://bdu.fstec.ru/vul/2019-04438",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04439",
"RefURL": "https://bdu.fstec.ru/vul/2019-04439",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04440",
"RefURL": "https://bdu.fstec.ru/vul/2019-04440",
"Source": "BDU"
},
{
"RefID": "CVE-2018-6118",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6118",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6120",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6120",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6121",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6121",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6122",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6122",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6123",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6123",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6124",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6124",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6125",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6125",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6126",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6126",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6127",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6127",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6128",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6128",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6129",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6129",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6130",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6130",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6131",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6131",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6132",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6132",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6133",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6133",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6134",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6134",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6135",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6135",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6136",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6137",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6137",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6138",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6138",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6139",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6139",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6140",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6140",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6141",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6141",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6142",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6142",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6143",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6143",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6144",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6144",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6145",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6145",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6147",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6147",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6148",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6148",
"Source": "CVE"
},
{
"RefID": "CVE-2018-6149",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-6149",
"Source": "CVE"
}
],
"Description": "This update upgrades chromium to version 67.0.3396.87-alt1. \nSecurity Fix(es):\n\n * BDU:2019-02430: Уязвимость браузера Google Chrome, связанная с записью данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04035: Уязвимость компонента API расширения Debugger браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04388: Уязвимость компонента Media Cache браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04389: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04390: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю повысить свои привилегии\n\n * BDU:2019-04391: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04392: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04393: Уязвимость компонента ReadableStreams механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04394: Уязвимость реализации протокола WebUSB браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности\n\n * BDU:2019-04395: Уязвимость библиотеки Skia браузеров Firefox ESR, Firefox, Google Chrome, позволяющая нарушителю записать произвольные файлы в файловую систему устройства\n\n * BDU:2019-04396: Уязвимость встроенной базы данных IndexDB браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04397: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04398: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04399: Уязвимость компонента WebAssembly браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04400: Уязвимость реализации технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2019-04427: Уязвимость браузера Google Chrome, связанная с неправильной обработкой данных, позволяющая нарушителю подменить содержимое в Omnibox (URL)\n\n * BDU:2019-04428: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю обойти политику отсутствия ссылок и раскрыть защищаемую информацию\n\n * BDU:2019-04429: Уязвимость модуля отображения Blink браузера Google Chrome, позволяющая нарушителю выполнить подделку домена\n\n * BDU:2019-04430: Уязвимость браузерного ядра V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04431: Уязвимость реализации технологии API CSS Paint браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04432: Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю обойти ограничения навигации\n\n * BDU:2019-04433: Уязвимость в chrome.debugger API (DevTools) браузера Google Chrome, позволяющая нарушителю убедить пользователя установить вредоносное расширение и выполнить произвольный код\n\n * BDU:2019-04434: Уязвимость фильтра изображений библиотеки Skia браузера Google Chrome, позволяющая нарушителю\n\n * BDU:2019-04435: Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04436: Уязвимость компонента V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04437: Уязвимость компонента PDFium браузера Google Chrome, позволяющая нарушителю выполнить запись за границами буфера в памяти\n\n * BDU:2019-04438: Уязвимость браузера Google Chrome, существющая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации\n\n * BDU:2019-04439: Уязвимость браузера Google Chrome, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию\n\n * BDU:2019-04440: Уязвимость браузера Google Chrome, существующая из-за неприятия мер по нейтрализации последовательностей CRLF, позволяющая нарушителю обойти ограничения навигации\n\n * CVE-2018-6118: A double-eviction in the Incognito mode cache that lead to a user-after-free in cache in Google Chrome prior to 66.0.3359.139 allowed a remote attacker who had compromised the renderer process to execute arbitrary code via a crafted HTML page.\n\n * CVE-2018-6120: An integer overflow that could lead to an attacker-controlled heap out-of-bounds write in PDFium in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted PDF file.\n\n * CVE-2018-6121: Insufficient validation of input in Blink in Google Chrome prior to 66.0.3359.170 allowed a remote attacker to perform privilege escalation via a crafted HTML page.\n\n * CVE-2018-6122: Type confusion in WebAssembly in Google Chrome prior to 66.0.3359.139 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6123: A use after free in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6124: Type confusion in ReadableStreams in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.\n\n * CVE-2018-6125: Insufficient policy enforcement in USB in Google Chrome on Windows prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.\n\n * CVE-2018-6126: A precision error in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.\n\n * CVE-2018-6127: Early free of object in use in IndexDB in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2018-6128: Incorrect URL parsing in WebKit in Google Chrome on iOS prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2018-6129: Out of bounds array access in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2018-6130: Incorrect handling of object lifetimes in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.\n\n * CVE-2018-6131: Object lifecycle issue in WebAssembly in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-6132: Uninitialized data in WebRTC in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted video file.\n\n * CVE-2018-6133: Incorrect handling of confusable characters in URL Formatter in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via IDN homographs via a crafted domain name.\n\n * CVE-2018-6134: Information leak in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass no-referrer policy via a crafted HTML page.\n\n * CVE-2018-6135: Lack of clearing the previous site before loading alerts from a new one in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform domain spoofing via a crafted HTML page.\n\n * CVE-2018-6136: Missing type check in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2018-6137: CSS Paint API in Blink in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to leak cross-origin data via a crafted HTML page.\n\n * CVE-2018-6138: Insufficient policy enforcement in Extensions API in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to bypass navigation restrictions via a crafted Chrome Extension.\n\n * CVE-2018-6139: Insufficient target checks on the chrome.debugger API in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.\n\n * CVE-2018-6140: Allowing the chrome.debugger API to attach to Web UI pages in DevTools in Google Chrome prior to 67.0.3396.62 allowed an attacker who convinced a user to install a malicious extension to execute arbitrary code via a crafted Chrome Extension.\n\n * CVE-2018-6141: Insufficient validation of an image filter in Skia in Google Chrome prior to 67.0.3396.62 allowed a remote attacker who had compromised the renderer process to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2018-6142: Array bounds check failure in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.\n\n * CVE-2018-6143: Insufficient validation in V8 in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2018-6144: Off-by-one error in PDFium in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to perform an out of bounds memory write via a crafted PDF file.\n\n * CVE-2018-6145: Insufficient data validation in HTML parser in Google Chrome prior to 67.0.3396.62 allowed a remote attacker to bypass same origin policy via a crafted HTML page.\n\n * CVE-2018-6147: Lack of secure text entry mode in Browser UI in Google Chrome on Mac prior to 67.0.3396.62 allowed a local attacker to obtain potentially sensitive information from process memory via a local process.\n\n * CVE-2018-6148: Incorrect implementation in Content Security Policy in Google Chrome prior to 67.0.3396.79 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.\n\n * CVE-2018-6149: Type confusion in JavaScript in Google Chrome prior to 67.0.3396.87 allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2018-07-01"
},
"Updated": {
"Date": "2018-07-01"
},
"BDUs": [
{
"ID": "BDU:2019-02430",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-02430",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "BDU:2019-04035",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04035",
"Impact": "High",
"Public": "20180102"
},
{
"ID": "BDU:2019-04388",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04388",
"Impact": "High",
"Public": "20180426"
},
{
"ID": "BDU:2019-04389",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04389",
"Impact": "High",
"Public": "20180510"
},
{
"ID": "BDU:2019-04390",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04390",
"Impact": "High",
"Public": "20180510"
},
{
"ID": "BDU:2019-04391",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-04391",
"Impact": "High",
"Public": "20180510"
},
{
"ID": "BDU:2019-04392",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04392",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04393",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://bdu.fstec.ru/vul/2019-04393",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04394",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-264",
"Href": "https://bdu.fstec.ru/vul/2019-04394",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04395",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04395",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04396",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04396",
"Impact": "Critical",
"Public": "20180529"
},
{
"ID": "BDU:2019-04397",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04397",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04398",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04398",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04399",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2019-04399",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04400",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04400",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04427",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-19",
"Href": "https://bdu.fstec.ru/vul/2019-04427",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04428",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04428",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04429",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-254",
"Href": "https://bdu.fstec.ru/vul/2019-04429",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04430",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04430",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04431",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04431",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04432",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04432",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04433",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2019-04433",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04434",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04434",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04435",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04435",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04436",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-04436",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04437",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2019-04437",
"Impact": "High",
"Public": "20180529"
},
{
"ID": "BDU:2019-04438",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2019-04438",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04439",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2019-04439",
"Impact": "Low",
"Public": "20180529"
},
{
"ID": "BDU:2019-04440",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:C/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-93",
"Href": "https://bdu.fstec.ru/vul/2019-04440",
"Impact": "Low",
"Public": "20180529"
}
],
"CVEs": [
{
"ID": "CVE-2018-6118",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6118",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6120",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6120",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6121",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6121",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6122",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-843",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6122",
"Impact": "High",
"Public": "20211102"
},
{
"ID": "CVE-2018-6123",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6123",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6124",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-704",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6124",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6125",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6125",
"Impact": "Low",
"Public": "20211102"
},
{
"ID": "CVE-2018-6126",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6126",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6127",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6127",
"Impact": "Critical",
"Public": "20190109"
},
{
"ID": "CVE-2018-6128",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6128",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6129",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6129",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6130",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6130",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6131",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6131",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6132",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6132",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6133",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-19",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6133",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6134",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6134",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6135",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6135",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6136",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6136",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6137",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6137",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6138",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6138",
"Impact": "High",
"Public": "20190627"
},
{
"ID": "CVE-2018-6139",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6139",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6140",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6140",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6141",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6141",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6142",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6142",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6143",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6143",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6144",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6144",
"Impact": "High",
"Public": "20190109"
},
{
"ID": "CVE-2018-6145",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6145",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6147",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6147",
"Impact": "Low",
"Public": "20190109"
},
{
"ID": "CVE-2018-6148",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
"CWE": "CWE-93",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6148",
"Impact": "Low",
"Public": "20190627"
},
{
"ID": "CVE-2018-6149",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-6149",
"Impact": "High",
"Public": "20190627"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20181959001",
"Comment": "chromium is earlier than 0:67.0.3396.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181959002",
"Comment": "chromium-gnome is earlier than 0:67.0.3396.87-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20181959003",
"Comment": "chromium-kde is earlier than 0:67.0.3396.87-alt1"
}
]
}
]
}
}
]
}