<oval_definitions xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:oval="http://oval.mitre.org/XMLSchema/oval-common-5" xmlns:oval-def="http://oval.mitre.org/XMLSchema/oval-definitions-5" xmlns:unix-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#unix" xmlns:red-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" xmlns:ind-def="http://oval.mitre.org/XMLSchema/oval-definitions-5#independent" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://oval.mitre.org/XMLSchema/oval-common-5 oval-common-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5 oval-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#unix unix-definitions-schema.xsd http://oval.mitre.org/XMLSchema/oval-definitions-5#linux linux-definitions-schema.xsd">
<generator>
<oval:product_name>Oracle Errata System</oval:product_name>
<oval:product_version>Oracle Linux</oval:product_version>
<oval:schema_version>5.11</oval:schema_version>
<oval:timestamp>2024-09-21T18:56:20</oval:timestamp>
</generator>
<definitions>
<definition id="oval:com.oracle.elsa:def:20183006" version="501" class="patch">
<metadata>
<title>
ELSA-2018-3006:  firefox security update (CRITICAL)
</title>
<affected family="unix">
<platform>Oracle Linux 6</platform>

</affected>
<reference source="elsa" ref_id="ELSA-2018-3006" ref_url="https://linux.oracle.com/errata/ELSA-2018-3006.html"/>
<reference source="CVE" ref_id="CVE-2018-12389" ref_url="https://linux.oracle.com/cve/CVE-2018-12389.html"/>
<reference source="CVE" ref_id="CVE-2018-12390" ref_url="https://linux.oracle.com/cve/CVE-2018-12390.html"/>
<reference source="CVE" ref_id="CVE-2018-12392" ref_url="https://linux.oracle.com/cve/CVE-2018-12392.html"/>
<reference source="CVE" ref_id="CVE-2018-12395" ref_url="https://linux.oracle.com/cve/CVE-2018-12395.html"/>
<reference source="CVE" ref_id="CVE-2018-12386" ref_url="https://linux.oracle.com/cve/CVE-2018-12386.html"/>
<reference source="CVE" ref_id="CVE-2018-12396" ref_url="https://linux.oracle.com/cve/CVE-2018-12396.html"/>
<reference source="CVE" ref_id="CVE-2018-12397" ref_url="https://linux.oracle.com/cve/CVE-2018-12397.html"/>
<reference source="CVE" ref_id="CVE-2017-16541" ref_url="https://linux.oracle.com/cve/CVE-2017-16541.html"/>
<reference source="CVE" ref_id="CVE-2018-12376" ref_url="https://linux.oracle.com/cve/CVE-2018-12376.html"/>
<reference source="CVE" ref_id="CVE-2018-12393" ref_url="https://linux.oracle.com/cve/CVE-2018-12393.html"/>
<reference source="CVE" ref_id="CVE-2018-12377" ref_url="https://linux.oracle.com/cve/CVE-2018-12377.html"/>
<reference source="CVE" ref_id="CVE-2018-12378" ref_url="https://linux.oracle.com/cve/CVE-2018-12378.html"/>
<reference source="CVE" ref_id="CVE-2018-12379" ref_url="https://linux.oracle.com/cve/CVE-2018-12379.html"/>
<reference source="CVE" ref_id="CVE-2018-12387" ref_url="https://linux.oracle.com/cve/CVE-2018-12387.html"/>

<description>
[60.3.0-1.0.1]
- fix LD_LIBRARY_PATH
- Add firefox-oracle-default-prefs.js and remove the corresponding Red Hat one

[60.3.0-1]
- Update to 60.3.0 ESR

[60.2.2-2]
- Added patch for rhbz#1633932

[60.2.2-1]
- Update to 60.2.2 ESR

[60.2.1-1]
- Update to 60.2.1 ESR

[60.2.0-1]
- Update to 60.2.0 ESR

[60.1.0-9]
- Do not set user agent (rhbz#1608065)
- GTK dialogs are localized now (rhbz#1619373)
- JNLP association works again (rhbz#1607457)

[60.1.0-8]
- Fixed homepage and bookmarks (rhbz#1606778)
- Fixed missing file associations in RHEL6 (rhbz#1613565)

[60.1.0-7]
- Run at-spi-bus if not running already (for the bundled gtk3)

[60.1.0-6]
- Fix for missing schemes for bundled gtk3

[60.1.0-5]
- Added mesa-libEGL dependency to gtk3/rhel6

[60.1.0-4]
- Disabled jemalloc on all second arches

[60.1.0-3]
- Updated to 60.1.0 ESR build2

[60.1.0-2]
- Disabled jemalloc on second arches

[60.1.0-1]
- Updated to 60.1.0 ESR

[60.0-12]
- Fixing bundled libffi issues
- Readded some requirements

[60.0-10]
- Added fix for mozilla BZ#1436242 - IPC crashes.

[60.0-9]
- Bundling libffi for the sec-arches
- Added openssl-devel for the Python
- Fixing bundled gtk3

[60.0-8]
- Added fix for mozilla BZ#1458492

[60.0-7]
- Added patch from rhbz#1498561 to fix ppc64(le) crashes.

[60.0-6]
- Disabled jemalloc on second arches

[60.0-4]
- Update to 60.0 ESR
</description>
<!--
 ~~~~~~~~~~~~~~~~~~~~   advisory details   ~~~~~~~~~~~~~~~~~~~ 
-->
<advisory>
<severity>CRITICAL</severity>
<rights>Copyright 2018 Oracle, Inc.</rights>
<issued date="2018-11-01"/>
<cve cvss3="8.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12389.html" public="20190228">CVE-2018-12389</cve>
<cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12390.html" public="20190228">CVE-2018-12390</cve>
<cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12392.html" public="20190228">CVE-2018-12392</cve>
<cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2018-12395.html" public="20190228">CVE-2018-12395</cve>
<cve cvss3="8.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N" href="https://linux.oracle.com/cve/CVE-2018-12386.html" public="20181018">CVE-2018-12386</cve>
<cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N" href="https://linux.oracle.com/cve/CVE-2018-12396.html" public="20190228">CVE-2018-12396</cve>
<cve cvss3="7.1/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N" href="https://linux.oracle.com/cve/CVE-2018-12397.html" public="20190228">CVE-2018-12397</cve>
<cve cvss3="6.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" href="https://linux.oracle.com/cve/CVE-2017-16541.html" public="20171104">CVE-2017-16541</cve>
<cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12376.html" public="20181018">CVE-2018-12376</cve>
<cve cvss3="7.5/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2018-12393.html" public="20190228">CVE-2018-12393</cve>
<cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12377.html" public="20181018">CVE-2018-12377</cve>
<cve cvss3="9.8/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12378.html" public="20181018">CVE-2018-12378</cve>
<cve cvss3="7.8/CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" href="https://linux.oracle.com/cve/CVE-2018-12379.html" public="20181018">CVE-2018-12379</cve>
<cve cvss3="9.1/CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H" href="https://linux.oracle.com/cve/CVE-2018-12387.html" public="20181018">CVE-2018-12387</cve>

<affected_cpe_list>
<cpe>cpe:/a:oracle:linux:6:10:patch</cpe>
<cpe>cpe:/a:oracle:linux:6::latest</cpe>
</affected_cpe_list>
</advisory>
</metadata>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20183006001" comment="Oracle Linux 6 is installed"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20183006002" comment="Oracle Linux arch is x86_64"/>
<criteria operator="AND">
<criterion test_ref="oval:com.oracle.elsa:tst:20183006003" comment="firefox is earlier than 0:60.3.0-1.0.1.el6"/>
<criterion test_ref="oval:com.oracle.elsa:tst:20183006004" comment="firefox is signed with the Oracle Linux 6 key"/>
</criteria>
</criteria>
</criteria>

</definition>
</definitions>
<!--
 ~~~~~~~~~~~~~~~~~~~~~   rpminfo tests   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<tests>
<rpminfo_test id="oval:com.oracle.elsa:tst:20183006001"  version="501" comment="Oracle Linux 6 is installed" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20183006001" />
<state state_ref="oval:com.oracle.elsa:ste:20183006002" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20183006002"  version="501" comment="Oracle Linux arch is x86_64" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20183006001" />
<state state_ref="oval:com.oracle.elsa:ste:20183006003" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20183006003"  version="501" comment="firefox is earlier than 0:60.3.0-1.0.1.el6" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20183006002" />
<state state_ref="oval:com.oracle.elsa:ste:20183006004" />
</rpminfo_test>
<rpminfo_test id="oval:com.oracle.elsa:tst:20183006004"  version="501" comment="firefox is signed with the Oracle Linux 6 key" check="at least one" xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux">
<object object_ref="oval:com.oracle.elsa:obj:20183006002" />
<state state_ref="oval:com.oracle.elsa:ste:20183006001" />
</rpminfo_test>

</tests>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo objects   ~~~~~~~~~~~~~~~~~~~~ 
-->
<objects>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20183006002" version="501">
<name>firefox</name>
</rpminfo_object>
<rpminfo_object xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:obj:20183006001" version="501">
<name>oraclelinux-release</name>
</rpminfo_object>

</objects>
<states>
<!--
 ~~~~~~~~~~~~~~~~~~~~   rpminfo states   ~~~~~~~~~~~~~~~~~~~~~ 
-->
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20183006001" version="501">
<signature_keyid operation="equals">72f97b74ec551f03</signature_keyid>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20183006002" version="501">
<version operation="pattern match">^6</version>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20183006003" version="501">
<arch operation="pattern match">x86_64</arch>
</rpminfo_state>
<rpminfo_state xmlns="http://oval.mitre.org/XMLSchema/oval-definitions-5#linux" id="oval:com.oracle.elsa:ste:20183006004" version="501">
<evr datatype="evr_string" operation="less than">0:60.3.0-1.0.1.el6</evr>
</rpminfo_state>

</states>
</oval_definitions>
