2024-04-23 09:02:10 +00:00

590 lines
28 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20246966",
"Version": "oval:org.altlinux.errata:def:20246966",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2024-6966: package `sox` update to version 14.4.2-alt7",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2024-6966",
"RefURL": "https://errata.altlinux.org/ALT-PU-2024-6966",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-02872",
"RefURL": "https://bdu.fstec.ru/vul/2019-02872",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02873",
"RefURL": "https://bdu.fstec.ru/vul/2019-02873",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02874",
"RefURL": "https://bdu.fstec.ru/vul/2019-02874",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02875",
"RefURL": "https://bdu.fstec.ru/vul/2019-02875",
"Source": "BDU"
},
{
"RefID": "BDU:2019-02928",
"RefURL": "https://bdu.fstec.ru/vul/2019-02928",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01648",
"RefURL": "https://bdu.fstec.ru/vul/2023-01648",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01677",
"RefURL": "https://bdu.fstec.ru/vul/2023-01677",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01700",
"RefURL": "https://bdu.fstec.ru/vul/2023-01700",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01722",
"RefURL": "https://bdu.fstec.ru/vul/2023-01722",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01723",
"RefURL": "https://bdu.fstec.ru/vul/2023-01723",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05656",
"RefURL": "https://bdu.fstec.ru/vul/2023-05656",
"Source": "BDU"
},
{
"RefID": "CVE-2017-11332",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11332",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11358",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11358",
"Source": "CVE"
},
{
"RefID": "CVE-2017-11359",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-11359",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15370",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15370",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15371",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15371",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15372",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15372",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15642",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15642",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13590",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13590",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8354",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8354",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8355",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8355",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8356",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8356",
"Source": "CVE"
},
{
"RefID": "CVE-2019-8357",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-8357",
"Source": "CVE"
},
{
"RefID": "CVE-2021-23159",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-23159",
"Source": "CVE"
},
{
"RefID": "CVE-2021-33844",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-33844",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3643",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3643",
"Source": "CVE"
},
{
"RefID": "CVE-2021-40426",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-40426",
"Source": "CVE"
},
{
"RefID": "CVE-2022-31650",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31650",
"Source": "CVE"
},
{
"RefID": "CVE-2022-31651",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-31651",
"Source": "CVE"
},
{
"RefID": "CVE-2023-32627",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-32627",
"Source": "CVE"
}
],
"Description": "This update upgrades sox to version 14.4.2-alt7. \nSecurity Fix(es):\n\n * BDU:2019-02872: Уязвимость функции lsx_make_lpf (effect_i_dsp.c) аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02873: Уязвимость функции channel_start (remix.c) аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02874: Уязвимость функции bitrv2 (fft4g.c) аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02875: Уязвимость функции lsx_make_lpf (effect_i_dsp.c) аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-02928: Уязвимость функции startread библиотеки libsox.a аудиоредактора Sound eXchange (SoX), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01648: Уязвимость функции read_samples компонента hcom.c программы обработки звука SoX, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01677: Уязвимость функции lsx_adpcm_init программы обработки звука SoX, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2023-01700: Уязвимость функции start_read() программы обработки звука SoX, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2023-01722: Уязвимость функции lsx_aiffstartwrite компонента aiff.c аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01723: Уязвимость функции rate_init компонента rate.c аудиоредактора Sound eXchange, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-05656: Уязвимость функции read_samples() программы обработки звука Sound eXchange (SoX), позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-11332: The startread function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted wav file.\n\n * CVE-2017-11358: The read_samples function in hcom.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted hcom file.\n\n * CVE-2017-11359: The wavwritehdr function in wav.c in Sound eXchange (SoX) 14.4.2 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted snd file, during conversion to a wav file.\n\n * CVE-2017-15370: There is a heap-based buffer overflow in the ImaExpandS function of ima_rw.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.\n\n * CVE-2017-15371: There is a reachable assertion abort in the function sox_append_comment() in formats.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.\n\n * CVE-2017-15372: There is a stack-based buffer overflow in the lsx_ms_adpcm_block_expand_i function of adpcm.c in Sound eXchange (SoX) 14.4.2. A Crafted input will lead to a denial of service attack during conversion of an audio file.\n\n * CVE-2017-15642: In lsx_aiffstartread in aiff.c in Sound eXchange (SoX) 14.4.2, there is a Use-After-Free vulnerability triggered by supplying a malformed AIFF file.\n\n * CVE-2019-13590: An issue was discovered in libsox.a in SoX 14.4.2. In sox-fmt.h (startread function), there is an integer overflow on the result of integer addition (wraparound to 0) fed into the lsx_calloc macro that wraps malloc. When a NULL pointer is returned, it is used without a prior check that it is a valid pointer, leading to a NULL pointer dereference on lsx_readbuf in formats_i.c.\n\n * CVE-2019-8354: An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c has an integer overflow on the result of multiplication fed into malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow.\n\n * CVE-2019-8355: An issue was discovered in SoX 14.4.2. In xmalloc.h, there is an integer overflow on the result of multiplication fed into the lsx_valloc macro that wraps malloc. When the buffer is allocated, it is smaller than expected, leading to a heap-based buffer overflow in channels_start in remix.c.\n\n * CVE-2019-8356: An issue was discovered in SoX 14.4.2. One of the arguments to bitrv2 in fft4g.c is not guarded, such that it can lead to write access outside of the statically declared array, aka a stack-based buffer overflow.\n\n * CVE-2019-8357: An issue was discovered in SoX 14.4.2. lsx_make_lpf in effect_i_dsp.c allows a NULL pointer dereference.\n\n * CVE-2021-23159: A vulnerability was found in SoX, where a heap-buffer-overflow occurs in function lsx_read_w_buf() in formats_i.c file. The vulnerability is exploitable with a crafted file, that could cause an application to crash.\n\n * CVE-2021-33844: A floating point exception (divide-by-zero) issue was discovered in SoX in functon startread() of wav.c file. An attacker with a crafted wav file, could cause an application to crash.\n\n * CVE-2021-3643: A flaw was found in sox 14.4.1. The lsx_adpcm_init function within libsox leads to a global-buffer-overflow. This flaw allows an attacker to input a malicious file, leading to the disclosure of sensitive information.\n\n * CVE-2021-40426: A heap-based buffer overflow vulnerability exists in the sphere.c start_read() functionality of Sound Exchange libsox 14.4.2 and master commit 42b3557e. A specially-crafted file can lead to a heap buffer overflow. An attacker can provide a malicious file to trigger this vulnerability.\n\n * CVE-2022-31650: In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.\n\n * CVE-2022-31651: In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.\n\n * CVE-2023-32627: A floating point exception vulnerability was found in sox, in the read_samples function at sox/src/voc.c:334:18. This flaw can lead to a denial of service.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2024-04-23"
},
"Updated": {
"Date": "2024-04-23"
},
"BDUs": [
{
"ID": "BDU:2019-02872",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-02872",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "BDU:2019-02873",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2019-02873",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "BDU:2019-02874",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2019-02874",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "BDU:2019-02875",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02875",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "BDU:2019-02928",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-190, CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-02928",
"Impact": "High",
"Public": "20190628"
},
{
"ID": "BDU:2023-01648",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-01648",
"Impact": "Low",
"Public": "20170730"
},
{
"ID": "BDU:2023-01677",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-01677",
"Impact": "Critical",
"Public": "20210709"
},
{
"ID": "BDU:2023-01700",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2023-01700",
"Impact": "High",
"Public": "20230203"
},
{
"ID": "BDU:2023-01722",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-697",
"Href": "https://bdu.fstec.ru/vul/2023-01722",
"Impact": "Low",
"Public": "20230210"
},
{
"ID": "BDU:2023-01723",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://bdu.fstec.ru/vul/2023-01723",
"Impact": "Low",
"Public": "20230210"
},
{
"ID": "BDU:2023-05656",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-697, CWE-1077",
"Href": "https://bdu.fstec.ru/vul/2023-05656",
"Impact": "Low",
"Public": "20230710"
}
],
"CVEs": [
{
"ID": "CVE-2017-11332",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11332",
"Impact": "Low",
"Public": "20170731"
},
{
"ID": "CVE-2017-11358",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11358",
"Impact": "Low",
"Public": "20170731"
},
{
"ID": "CVE-2017-11359",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-11359",
"Impact": "Low",
"Public": "20170731"
},
{
"ID": "CVE-2017-15370",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15370",
"Impact": "Low",
"Public": "20171016"
},
{
"ID": "CVE-2017-15371",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15371",
"Impact": "Low",
"Public": "20171016"
},
{
"ID": "CVE-2017-15372",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15372",
"Impact": "Low",
"Public": "20171016"
},
{
"ID": "CVE-2017-15642",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15642",
"Impact": "Low",
"Public": "20171019"
},
{
"ID": "CVE-2019-13590",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13590",
"Impact": "Low",
"Public": "20190714"
},
{
"ID": "CVE-2019-8354",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8354",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "CVE-2019-8355",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8355",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "CVE-2019-8356",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8356",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "CVE-2019-8357",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-8357",
"Impact": "Low",
"Public": "20190215"
},
{
"ID": "CVE-2021-23159",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-23159",
"Impact": "Low",
"Public": "20220825"
},
{
"ID": "CVE-2021-33844",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-33844",
"Impact": "Low",
"Public": "20220825"
},
{
"ID": "CVE-2021-3643",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3643",
"Impact": "Critical",
"Public": "20220502"
},
{
"ID": "CVE-2021-40426",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-40426",
"Impact": "High",
"Public": "20220414"
},
{
"ID": "CVE-2022-31650",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-697",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31650",
"Impact": "Low",
"Public": "20220525"
},
{
"ID": "CVE-2022-31651",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-617",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-31651",
"Impact": "Low",
"Public": "20220525"
},
{
"ID": "CVE-2023-32627",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-697",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-32627",
"Impact": "Low",
"Public": "20230710"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20246966001",
"Comment": "libsox-devel is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966002",
"Comment": "libsox-fmt-alsa is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966003",
"Comment": "libsox-fmt-ao is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966004",
"Comment": "libsox-fmt-caf is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966005",
"Comment": "libsox-fmt-fap is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966006",
"Comment": "libsox-fmt-flac is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966007",
"Comment": "libsox-fmt-gsm is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966008",
"Comment": "libsox-fmt-lpc10 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966009",
"Comment": "libsox-fmt-mat4 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966010",
"Comment": "libsox-fmt-mat5 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966011",
"Comment": "libsox-fmt-mp3 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966012",
"Comment": "libsox-fmt-opus is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966013",
"Comment": "libsox-fmt-oss is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966014",
"Comment": "libsox-fmt-paf is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966015",
"Comment": "libsox-fmt-pulseaudio is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966016",
"Comment": "libsox-fmt-pvf is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966017",
"Comment": "libsox-fmt-sd2 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966018",
"Comment": "libsox-fmt-sndfile is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966019",
"Comment": "libsox-fmt-vorbis is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966020",
"Comment": "libsox-fmt-w64 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966021",
"Comment": "libsox-fmt-wavpack is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966022",
"Comment": "libsox-fmt-xi is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966023",
"Comment": "libsox3 is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966024",
"Comment": "sox is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966025",
"Comment": "sox-base is earlier than 0:14.4.2-alt7"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20246966026",
"Comment": "sox-play is earlier than 0:14.4.2-alt7"
}
]
}
]
}
}
]
}