569 lines
28 KiB
JSON
569 lines
28 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20142376",
|
|
"Version": "oval:org.altlinux.errata:def:20142376",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2014-2376: package `python` update to version 2.7.8-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p11"
|
|
],
|
|
"Products": [
|
|
"ALT Container"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2014-2376",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2014-2376",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00125",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00125",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00126",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00126",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00127",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00127",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00128",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00128",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-00666",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-00666",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-04312",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-04312",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-04313",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-04313",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05844",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05844",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05845",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05845",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05846",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05846",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05847",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05847",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05848",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05848",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05849",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05849",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05850",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05850",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05851",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05851",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05852",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05852",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05853",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05853",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05854",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05854",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-05855",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-05855",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07477",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07477",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07482",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07482",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07483",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07483",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-07485",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-07485",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2015-09698",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2015-09698",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2013-7040",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2013-7040",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-0224",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-1912",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-1912",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4616",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4616",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-4650",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-4650",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2014-7185",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2014-7185",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades python to version 2.7.8-alt1. \nSecurity Fix(es):\n\n * BDU:2015-00125: Уязвимость программного обеспечения Cisco ACE, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00126: Уязвимость программного обеспечения Cisco ASA, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00127: Уязвимость программного обеспечения Cisco IPS, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00128: Уязвимость программного обеспечения Cisco Unified Communications Manager, позволяющая злоумышленнику перехватить сессию\n\n * BDU:2015-00666: Уязвимость программного обеспечения Python, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04312: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-04313: Уязвимости операционной системы SUSE Linux Enterprise, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05844: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05845: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05846: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05847: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05848: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05849: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05850: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05851: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05852: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05853: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05854: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-05855: Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07477: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07482: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07483: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-07485: Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2015-09698: Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации\n\n * CVE-2013-7040: Python 2.7 before 3.4 only uses the last eight bits of the prefix to randomize hash values, which causes it to compute hash values without restricting the ability to trigger hash collisions predictably and makes it easier for context-dependent attackers to cause a denial of service (CPU consumption) via crafted input to an application that maintains a hash table. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-1150.\n\n * CVE-2014-0224: OpenSSL before 0.9.8za, 1.0.0 before 1.0.0m, and 1.0.1 before 1.0.1h does not properly restrict processing of ChangeCipherSpec messages, which allows man-in-the-middle attackers to trigger use of a zero-length master key in certain OpenSSL-to-OpenSSL communications, and consequently hijack sessions or obtain sensitive information, via a crafted TLS handshake, aka the \"CCS Injection\" vulnerability.\n\n * CVE-2014-1912: Buffer overflow in the socket.recvfrom_into function in Modules/socketmodule.c in Python 2.5 before 2.7.7, 3.x before 3.3.4, and 3.4.x before 3.4rc1 allows remote attackers to execute arbitrary code via a crafted string.\n\n * CVE-2014-4616: Array index error in the scanstring function in the _json module in Python 2.7 through 3.5 and simplejson before 2.6.1 allows context-dependent attackers to read arbitrary process memory via a negative index value in the idx argument to the raw_decode function.\n\n * CVE-2014-4650: The CGIHTTPServer module in Python 2.7.5 and 3.3.4 does not properly handle URLs in which URL encoding is used for path separators, which allows remote attackers to read script source code or conduct directory traversal attacks and execute unintended code via a crafted character sequence, as demonstrated by a %2f separator.\n\n * CVE-2014-7185: Integer overflow in bufferobject.c in Python before 2.7.8 allows context-dependent attackers to obtain sensitive information from process memory via a large size and offset in a \"buffer\" function.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "Critical",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2014-11-20"
|
|
},
|
|
"Updated": {
|
|
"Date": "2014-11-20"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2015-00125",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00125",
|
|
"Impact": "Low",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00126",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00126",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00127",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00127",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00128",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00128",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-00666",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-22",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-00666",
|
|
"Impact": "Critical",
|
|
"Public": "20140701"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-04312",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-04312",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-04313",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-04313",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05844",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05844",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05845",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05845",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05846",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05846",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05847",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05847",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05848",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05848",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05849",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05849",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05850",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05850",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05851",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05851",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05852",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05852",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05853",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05853",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05854",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05854",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-05855",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-120",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-05855",
|
|
"Impact": "Low"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07477",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07477",
|
|
"Impact": "Critical",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07482",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07482",
|
|
"Impact": "High",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07483",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07483",
|
|
"Impact": "Low",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-07485",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-07485",
|
|
"Impact": "Critical",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "BDU:2015-09698",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://bdu.fstec.ru/vul/2015-09698",
|
|
"Impact": "Low",
|
|
"Public": "20140727"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2013-7040",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CWE": "CWE-310",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2013-7040",
|
|
"Impact": "Low",
|
|
"Public": "20140519"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-0224",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
|
|
"CWE": "CWE-326",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-0224",
|
|
"Impact": "High",
|
|
"Public": "20140605"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-1912",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-1912",
|
|
"Impact": "High",
|
|
"Public": "20140301"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4616",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
|
|
"CWE": "CWE-129",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4616",
|
|
"Impact": "Low",
|
|
"Public": "20170824"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-4650",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-22",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-4650",
|
|
"Impact": "Critical",
|
|
"Public": "20200220"
|
|
},
|
|
{
|
|
"ID": "CVE-2014-7185",
|
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:N/A:P",
|
|
"CWE": "CWE-189",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2014-7185",
|
|
"Impact": "Low",
|
|
"Public": "20141008"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:container:11"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376001",
|
|
"Comment": "libpython is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376002",
|
|
"Comment": "python is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376003",
|
|
"Comment": "python-base is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376004",
|
|
"Comment": "python-dev is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376005",
|
|
"Comment": "python-devel-static is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376006",
|
|
"Comment": "python-modules is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376007",
|
|
"Comment": "python-modules-bsddb is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376008",
|
|
"Comment": "python-modules-compiler is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376009",
|
|
"Comment": "python-modules-ctypes is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376010",
|
|
"Comment": "python-modules-curses is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376011",
|
|
"Comment": "python-modules-email is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376012",
|
|
"Comment": "python-modules-encodings is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376013",
|
|
"Comment": "python-modules-hotshot is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376014",
|
|
"Comment": "python-modules-json is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376015",
|
|
"Comment": "python-modules-logging is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376016",
|
|
"Comment": "python-modules-multiprocessing is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376017",
|
|
"Comment": "python-modules-sqlite3 is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376018",
|
|
"Comment": "python-modules-tkinter is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376019",
|
|
"Comment": "python-modules-unittest is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376020",
|
|
"Comment": "python-modules-wsgiref is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376021",
|
|
"Comment": "python-modules-xml is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376022",
|
|
"Comment": "python-relaxed is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376023",
|
|
"Comment": "python-strict is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376024",
|
|
"Comment": "python-test is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376025",
|
|
"Comment": "python-tools-2to3 is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376026",
|
|
"Comment": "python-tools-i18n is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376027",
|
|
"Comment": "python-tools-idle is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376028",
|
|
"Comment": "python-tools-pynche is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376029",
|
|
"Comment": "python-tools-scripts is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376030",
|
|
"Comment": "python-tools-smtpd is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376031",
|
|
"Comment": "python-tools-webchecker is earlier than 0:2.7.8-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20142376032",
|
|
"Comment": "python-user-scripts is earlier than 0:2.7.8-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |