581 lines
28 KiB
JSON
581 lines
28 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182599",
|
||
"Version": "oval:org.altlinux.errata:def:20182599",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2599: package `chromium` update to version 70.0.3538.67-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p9"
|
||
],
|
||
"Products": [
|
||
"ALT Server",
|
||
"ALT Virtualization Server",
|
||
"ALT Workstation",
|
||
"ALT Workstation K",
|
||
"ALT Education",
|
||
"Simply Linux",
|
||
"Starterkit"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2599",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2599",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01336",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01336",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01337",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01337",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01338",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01338",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01339",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01339",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2018-01340",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2018-01340",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04356",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04356",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04357",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04357",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04358",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04358",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04359",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04359",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04360",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04360",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04361",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04361",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04378",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04378",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04379",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04379",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04380",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04380",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04381",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04381",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-04383",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-04383",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17462",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17462",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17463",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17463",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17464",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17464",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17465",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17465",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17466",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17466",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17467",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17467",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17468",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17468",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17469",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17469",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17470",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17470",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17471",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17471",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17472",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17472",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17473",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17473",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17474",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17474",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17475",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17475",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17476",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17476",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-17477",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-17477",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-20071",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-20071",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-5179",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades chromium to version 70.0.3538.67-alt1. \nSecurity Fix(es):\n\n * BDU:2018-01336: Уязвимость компонента AppCache веб-браузера Chrome, позволяющая нарушителю выйти из изолированной среды и выполнить произвольный код\n\n * BDU:2018-01337: Уязвимость обработчика JavaScript-сценариев V8 веб-браузера Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2018-01338: Уязвимость компонента Omnibox веб-браузера Chrome, позволяющая нарушителю подменить адрес URI\n\n * BDU:2018-01339: Уязвимость библиотеи angle веб-браузера Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2018-01340: Уязвимость компонента Omnibox веб-браузера Chrome, позволяющая нарушителю подменить адрес URI\n\n * BDU:2019-04356: Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании\n\n * BDU:2019-04357: Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю получить URL-адреса перекрестного происхождения\n\n * BDU:2019-04358: Уязвимость обработчика PDF-содержимого PDFium браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04359: Уязвимость реализации движка графического процессора браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04360: Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю скрыть предупреждение о переходе в полноэкранный режим\n\n * BDU:2019-04361: Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04378: Уязвимость функции HTMLImportsController механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2019-04379: Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю осуществить подмену содержимого компонента Omnibox (URL)\n\n * BDU:2019-04380: Уязвимость компонента Cast браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю скрыть предупреждение о переходе в полноэкранный режим\n\n * BDU:2019-04381: Уязвимость браузера Google Chrome, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю осуществить подмену пользовательского интерфейса во вкладке «Расширения»\n\n * BDU:2019-04383: Уязвимость скрипта ServiceWorker браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * CVE-2018-17462: Incorrect refcounting in AppCache in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform a sandbox escape via a crafted HTML page.\n\n * CVE-2018-17463: Incorrect side effect annotation in V8 in Google Chrome prior to 70.0.3538.64 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.\n\n * CVE-2018-17464: Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2018-17465: Incorrect implementation of object trimming in V8 in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit object corruption via a crafted HTML page.\n\n * CVE-2018-17466: Incorrect texture handling in Angle in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page.\n\n * CVE-2018-17467: Insufficiently quick clearing of stale rendered content in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2018-17468: Incorrect handling of timer information during navigation in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obtain cross origin URLs via a crafted HTML page.\n\n * CVE-2018-17469: Incorrect handling of PDF filter chains in PDFium in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.\n\n * CVE-2018-17470: A heap buffer overflow in GPU in Google Chrome prior to 70.0.3538.67 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.\n\n * CVE-2018-17471: Incorrect dialog placement in WebContents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.\n\n * CVE-2018-17472: Incorrect handling of googlechrome:// URL scheme on iOS in Intents in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to escape the \u003ciframe\u003e sandbox via a crafted HTML page.\n\n * CVE-2018-17473: Incorrect handling of confusable characters in Omnibox in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted domain name.\n\n * CVE-2018-17474: Use after free in HTMLImportsController in Blink in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2018-17475: Incorrect handling of history on iOS in Navigation in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.\n\n * CVE-2018-17476: Incorrect dialog placement in Cast UI in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to obscure the full screen warning via a crafted HTML page.\n\n * CVE-2018-17477: Incorrect dialog placement in Extensions in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to spoof the contents of extension popups via a crafted HTML page.\n\n * CVE-2018-20071: Insufficiently strict origin checks during JIT payment app installation in Payments in Google Chrome prior to 70.0.3538.67 allowed a remote attacker to install a service worker for a domain that can host attacker controled files via a crafted HTML page.\n\n * CVE-2018-5179: A service worker can send the activate event on itself periodically which allows it to run perpetually, allowing it to monitor activity by users. Affects all versions prior to Firefox 60.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-11-07"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-11-07"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2018-01336",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-265",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01336",
|
||
"Impact": "High",
|
||
"Public": "20180925"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01337",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01337",
|
||
"Impact": "High",
|
||
"Public": "20180925"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01338",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01338",
|
||
"Impact": "High",
|
||
"Public": "20180920"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01339",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01339",
|
||
"Impact": "High",
|
||
"Public": "20180905"
|
||
},
|
||
{
|
||
"ID": "BDU:2018-01340",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-451",
|
||
"Href": "https://bdu.fstec.ru/vul/2018-01340",
|
||
"Impact": "High",
|
||
"Public": "20180519"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04356",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04356",
|
||
"Impact": "High",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04357",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04357",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04358",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04358",
|
||
"Impact": "High",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04359",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04359",
|
||
"Impact": "High",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04360",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04360",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04361",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04361",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04378",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04378",
|
||
"Impact": "High",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04379",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04379",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04380",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04380",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04381",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04381",
|
||
"Impact": "Low",
|
||
"Public": "20181016"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-04383",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-20, CWE-772",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-04383",
|
||
"Impact": "High",
|
||
"Public": "20180426"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-17462",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17462",
|
||
"Impact": "Critical",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17463",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17463",
|
||
"Impact": "High",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17464",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17464",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17465",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17465",
|
||
"Impact": "High",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17466",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17466",
|
||
"Impact": "High",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17467",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "CWE-459",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17467",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17468",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-200",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17468",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17469",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17469",
|
||
"Impact": "High",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17470",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17470",
|
||
"Impact": "High",
|
||
"Public": "20190109"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17471",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17471",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17472",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H",
|
||
"CWE": "CWE-20",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17472",
|
||
"Impact": "Critical",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17473",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17473",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17474",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17474",
|
||
"Impact": "High",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17475",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17475",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17476",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17476",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-17477",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
|
||
"CWE": "NVD-CWE-noinfo",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-17477",
|
||
"Impact": "Low",
|
||
"Public": "20181114"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-20071",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
|
||
"CWE": "CWE-79",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-20071",
|
||
"Impact": "Low",
|
||
"Public": "20190109"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-5179",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-772",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-5179",
|
||
"Impact": "High",
|
||
"Public": "20190426"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:kworkstation:9",
|
||
"cpe:/o:alt:workstation:9",
|
||
"cpe:/o:alt:server:9",
|
||
"cpe:/o:alt:server-v:9",
|
||
"cpe:/o:alt:education:9",
|
||
"cpe:/o:alt:slinux:9",
|
||
"cpe:/o:alt:starterkit:p9",
|
||
"cpe:/o:alt:kworkstation:9.1",
|
||
"cpe:/o:alt:workstation:9.1",
|
||
"cpe:/o:alt:server:9.1",
|
||
"cpe:/o:alt:server-v:9.1",
|
||
"cpe:/o:alt:education:9.1",
|
||
"cpe:/o:alt:slinux:9.1",
|
||
"cpe:/o:alt:starterkit:9.1",
|
||
"cpe:/o:alt:kworkstation:9.2",
|
||
"cpe:/o:alt:workstation:9.2",
|
||
"cpe:/o:alt:server:9.2",
|
||
"cpe:/o:alt:server-v:9.2",
|
||
"cpe:/o:alt:education:9.2",
|
||
"cpe:/o:alt:slinux:9.2",
|
||
"cpe:/o:alt:starterkit:9.2"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182599001",
|
||
"Comment": "chromium is earlier than 0:70.0.3538.67-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182599002",
|
||
"Comment": "chromium-gnome is earlier than 0:70.0.3538.67-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182599003",
|
||
"Comment": "chromium-kde is earlier than 0:70.0.3538.67-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |