2024-06-28 13:17:52 +00:00

189 lines
8.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20172721",
"Version": "oval:org.altlinux.errata:def:20172721",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2017-2721: package `palemoon` update to version 27.6.2-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2017-2721",
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2721",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-00213",
"RefURL": "https://bdu.fstec.ru/vul/2021-00213",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00216",
"RefURL": "https://bdu.fstec.ru/vul/2021-00216",
"Source": "BDU"
},
{
"RefID": "BDU:2021-00235",
"RefURL": "https://bdu.fstec.ru/vul/2021-00235",
"Source": "BDU"
},
{
"RefID": "CVE-2017-7832",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7832",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7835",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7835",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7840",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7840",
"Source": "CVE"
}
],
"Description": "This update upgrades palemoon to version 27.6.2-alt1. \nSecurity Fix(es):\n\n * BDU:2021-00213: Уязвимость браузера Mozilla Firefox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * BDU:2021-00216: Уязвимость браузера Mozilla Firefox, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю проводить спуфинг-атаки\n\n * BDU:2021-00235: Уязвимость браузера Mozilla Firefox, связанная с недостатками используемых мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки\n\n * CVE-2017-7832: The combined, single character, version of the letter 'i' with any of the potential accents in unicode, such as acute or grave, can be spoofed in the addressbar by the dotless version of 'i' followed by the same accent as a second character with most font sets. This allows for domain spoofing attacks because these combined domain names do not display as punycode. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7835: Mixed content blocking of insecure (HTTP) sub-resources in a secure (HTTPS) document was not correctly applied for resources that redirect from HTTPS to HTTP, allowing content that should be blocked, such as scripts, to be loaded on a page. This vulnerability affects Firefox \u003c 57.\n\n * CVE-2017-7840: JavaScript can be injected into an exported bookmarks file by placing JavaScript code into user-supplied tags in saved bookmarks. If the resulting exported HTML file is later opened in a browser this JavaScript will be executed. This could be used in social engineering and self-cross-site-scripting (self-XSS) attacks if users were convinced to add malicious tags to bookmarks, export them, and then open the resulting file. This vulnerability affects Firefox \u003c 57.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2017-12-02"
},
"Updated": {
"Date": "2017-12-02"
},
"BDUs": [
{
"ID": "BDU:2021-00213",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00213",
"Impact": "High",
"Public": "20170922"
},
{
"ID": "BDU:2021-00216",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://bdu.fstec.ru/vul/2021-00216",
"Impact": "Low",
"Public": "20171015"
},
{
"ID": "BDU:2021-00235",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://bdu.fstec.ru/vul/2021-00235",
"Impact": "Low",
"Public": "20170519"
}
],
"CVEs": [
{
"ID": "CVE-2017-7832",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"CWE": "CWE-20",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7832",
"Impact": "Low",
"Public": "20180611"
},
{
"ID": "CVE-2017-7835",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "NVD-CWE-noinfo",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7835",
"Impact": "High",
"Public": "20180611"
},
{
"ID": "CVE-2017-7840",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"CWE": "CWE-79",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7840",
"Impact": "Low",
"Public": "20180611"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20172721001",
"Comment": "newmoon-base is earlier than 2:27.6.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172721002",
"Comment": "newmoon-data is earlier than 2:27.6.2-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20172721003",
"Comment": "rpm-build-palemoon is earlier than 2:27.6.2-alt1"
}
]
}
]
}
}
]
}