csaf2cusa/csaf/advisories/2024/csaf-openEuler-SA-2024-1859.json
Jia Chao 6669e5b3b8 修改,适用 csaf
Signed-off-by: Jia Chao <jiac13@chinaunicom.cn>
2024-07-24 15:38:55 +08:00

526 lines
20 KiB
JSON

{
"document":{
"aggregate_severity":{
"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
"text":"Critical"
},
"category":"csaf_vex",
"csaf_version":"2.0",
"distribution":{
"tlp":{
"label":"WHITE",
"url":"https:/www.first.org/tlp/"
}
},
"lang":"en",
"notes":[
{
"text":"firefox security update",
"category":"general",
"title":"Synopsis"
},
{
"text":"An update for firefox is now available for openEuler-20.03-LTS-SP4",
"category":"general",
"title":"Summary"
},
{
"text":"Mozilla Firefox is a standalone web browser, designed for standards compliance and performance. Its functionality can be enhanced via a plethora of extensions.\n\nSecurity Fix(es):Mozilla Firefox is an open-source web browser, designed for standards compliance, performance and portability.\n\nSecurity Fix(es):\n\nWhen processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.(CVE-2020-15675)\n\nUsing the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.(CVE-2021-23954)\n\nIf an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.(CVE-2022-45406)",
"category":"general",
"title":"Description"
},
{
"text":"An update for firefox is now available for openEuler-20.03-LTS-SP4.\n\nopenEuler Security has rated this update as having a security impact of critical. A Common Vunlnerability Scoring System(CVSS)base score,which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.",
"category":"general",
"title":"Topic"
},
{
"text":"Critical",
"category":"general",
"title":"Severity"
},
{
"text":"firefox",
"category":"general",
"title":"Affected Component"
}
],
"publisher":{
"issuing_authority":"openEuler security committee",
"name":"openEuler",
"namespace":"https://www.openeuler.org",
"contact_details":"openeuler-security@openeuler.org",
"category":"vendor"
},
"references":[
{
"summary":"openEuler-SA-2024-1859",
"category":"self",
"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1859"
},
{
"summary":"CVE-2020-15675",
"category":"self",
"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2020-15675&packageName=firefox"
},
{
"summary":"CVE-2021-23954",
"category":"self",
"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2021-23954&packageName=firefox"
},
{
"summary":"CVE-2022-45406",
"category":"self",
"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2022-45406&packageName=firefox"
},
{
"summary":"nvd cve",
"category":"external",
"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-15675"
},
{
"summary":"nvd cve",
"category":"external",
"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-23954"
},
{
"summary":"nvd cve",
"category":"external",
"url":"https://nvd.nist.gov/vuln/detail/CVE-2022-45406"
},
{
"summary":"openEuler-SA-2024-1859 vex file",
"category":"self",
"url":"https://repo.openeuler.org/security/data/csaf/advisories/2024/csaf-openEuler-SA-2024-1859.json"
}
],
"title":"An update for firefox is now available for openEuler-20.03-LTS-SP4",
"tracking":{
"initial_release_date":"2024-07-19T21:23:59+08:00",
"revision_history":[
{
"date":"2024-07-19T21:23:59+08:00",
"summary":"Initial",
"number":"1.0.0"
}
],
"generator":{
"date":"2024-07-19T21:23:59+08:00",
"engine":{
"name":"openEuler CSAF Tool V1.0"
}
},
"current_release_date":"2024-07-19T21:23:59+08:00",
"id":"openEuler-SA-2024-1859",
"version":"1.0.0",
"status":"final"
}
},
"product_tree":{
"branches":[
{
"name":"openEuler",
"category":"vendor",
"branches":[
{
"name":"openEuler",
"branches":[
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"openEuler-20.03-LTS-SP4",
"name":"openEuler-20.03-LTS-SP4"
},
"name":"openEuler-20.03-LTS-SP4",
"category":"product_version"
}
],
"category":"product_name"
},
{
"name":"aarch64",
"branches":[
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-79.0-26.oe2003sp4.aarch64.rpm",
"name":"firefox-79.0-26.oe2003sp4.aarch64.rpm"
},
"name":"firefox-79.0-26.oe2003sp4.aarch64.rpm",
"category":"product_version"
},
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-debuginfo-79.0-26.oe2003sp4.aarch64.rpm",
"name":"firefox-debuginfo-79.0-26.oe2003sp4.aarch64.rpm"
},
"name":"firefox-debuginfo-79.0-26.oe2003sp4.aarch64.rpm",
"category":"product_version"
},
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-debugsource-79.0-26.oe2003sp4.aarch64.rpm",
"name":"firefox-debugsource-79.0-26.oe2003sp4.aarch64.rpm"
},
"name":"firefox-debugsource-79.0-26.oe2003sp4.aarch64.rpm",
"category":"product_version"
}
],
"category":"product_name"
},
{
"name":"src",
"branches":[
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-79.0-26.oe2003sp4.src.rpm",
"name":"firefox-79.0-26.oe2003sp4.src.rpm"
},
"name":"firefox-79.0-26.oe2003sp4.src.rpm",
"category":"product_version"
}
],
"category":"product_name"
},
{
"name":"x86_64",
"branches":[
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-79.0-26.oe2003sp4.x86_64.rpm",
"name":"firefox-79.0-26.oe2003sp4.x86_64.rpm"
},
"name":"firefox-79.0-26.oe2003sp4.x86_64.rpm",
"category":"product_version"
},
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"name":"firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm"
},
"name":"firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"category":"product_version"
},
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"firefox-debugsource-79.0-26.oe2003sp4.x86_64.rpm",
"name":"firefox-debugsource-79.0-26.oe2003sp4.x86_64.rpm"
},
"name":"firefox-debugsource-79.0-26.oe2003sp4.x86_64.rpm",
"category":"product_version"
},
{
"product":{
"product_identification_helper":{
"cpe":"cpe:/a:openEuler:openEuler:20.03-LTS-SP4"
},
"product_id":"mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"name":"mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm"
},
"name":"mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"category":"product_version"
}
],
"category":"product_name"
}
]
}
],
"relationships":[
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-79.0-26.oe2003sp4.aarch64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"name":"firefox-79.0-26.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-debuginfo-79.0-26.oe2003sp4.aarch64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"name":"firefox-debuginfo-79.0-26.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-debugsource-79.0-26.oe2003sp4.aarch64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"name":"firefox-debugsource-79.0-26.oe2003sp4.aarch64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-79.0-26.oe2003sp4.src.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"name":"firefox-79.0-26.oe2003sp4.src as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-79.0-26.oe2003sp4.x86_64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"name":"firefox-79.0-26.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"name":"firefox-debuginfo-79.0-26.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"firefox-debugsource-79.0-26.oe2003sp4.x86_64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"name":"firefox-debugsource-79.0-26.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
},
{
"relates_to_product_reference":"openEuler-20.03-LTS-SP4",
"product_reference":"mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64.rpm",
"full_product_name":{
"product_id":"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"name":"mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64 as a component of openEuler-20.03-LTS-SP4"
},
"category":"default_component_of"
}
]
},
"vulnerabilities":[
{
"cve":"CVE-2020-15675",
"notes":[
{
"text":"When processing surfaces, the lifetime may outlive a persistent buffer leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 81.",
"category":"description",
"title":"Vulnerability Description"
}
],
"product_status":{
"fixed":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
},
"remediations":[
{
"product_ids":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
],
"details":"firefox security update",
"category":"vendor_fix",
"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1859"
}
],
"scores":[
{
"cvss_v3":{
"baseSeverity":"HIGH",
"baseScore":8.8,
"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version":"3.1"
},
"products":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
}
],
"threats":[
{
"details":"High",
"category":"impact"
}
],
"title":"CVE-2020-15675"
},
{
"cve":"CVE-2021-23954",
"notes":[
{
"text":"Using the new logical assignment operators in a JavaScript switch statement could have caused a type confusion, leading to a memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 85, Thunderbird < 78.7, and Firefox ESR < 78.7.",
"category":"description",
"title":"Vulnerability Description"
}
],
"product_status":{
"fixed":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
},
"remediations":[
{
"product_ids":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
],
"details":"firefox security update",
"category":"vendor_fix",
"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1859"
}
],
"scores":[
{
"cvss_v3":{
"baseSeverity":"HIGH",
"baseScore":8.8,
"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version":"3.1"
},
"products":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
}
],
"threats":[
{
"details":"High",
"category":"impact"
}
],
"title":"CVE-2021-23954"
},
{
"cve":"CVE-2022-45406",
"notes":[
{
"text":"If an out-of-memory condition occurred when creating a JavaScript global, a JavaScript realm may be deleted while references to it lived on in a BaseShape. This could lead to a use-after-free causing a potentially exploitable crash. This vulnerability affects Firefox ESR < 102.5, Thunderbird < 102.5, and Firefox < 107.",
"category":"description",
"title":"Vulnerability Description"
}
],
"product_status":{
"fixed":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
},
"remediations":[
{
"product_ids":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
],
"details":"firefox security update",
"category":"vendor_fix",
"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2024-1859"
}
],
"scores":[
{
"cvss_v3":{
"baseSeverity":"CRITICAL",
"baseScore":9.8,
"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version":"3.1"
},
"products":[
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.aarch64",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.src",
"openEuler-20.03-LTS-SP4:firefox-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debuginfo-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:firefox-debugsource-79.0-26.oe2003sp4.x86_64",
"openEuler-20.03-LTS-SP4:mozilla-crashreporter-firefox-debuginfo-79.0-26.oe2003sp4.x86_64"
]
}
],
"threats":[
{
"details":"Critical",
"category":"impact"
}
],
"title":"CVE-2022-45406"
}
]
}