397 lines
19 KiB
JSON
397 lines
19 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20182047",
|
||
"Version": "oval:org.altlinux.errata:def:20182047",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2018-2047: package `ffmpeg` update to version 4.0.2-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2018-2047",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2018-2047",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-00420",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-00420",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2019-02098",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2019-02098",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13300",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13300",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13301",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13301",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13302",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13302",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13303",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13303",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13304",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13304",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-13305",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-13305",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-14394",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14394",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1999011",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999011",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1999012",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999012",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1999013",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999013",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1999014",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999014",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2018-1999015",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999015",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ffmpeg to version 4.0.2-alt1. \nSecurity Fix(es):\n\n * BDU:2019-00420: Уязвимость функции handle_eac3 фреймворка для работы с мультимедиа форматами FFmpeg, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2019-02098: Уязвимость мультимедийной библиотеки FFmpeg, связанная с переполнением буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * CVE-2018-13300: In FFmpeg 3.2 and 4.0.1, an improper argument (AVCodecParameters) passed to the avpriv_request_sample function in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array read while converting a crafted AVI file to MPEG4, leading to a denial of service and possibly an information disclosure.\n\n * CVE-2018-13301: In FFmpeg 4.0.1, due to a missing check of a profile value before setting it, the ff_mpeg4_decode_picture_header function in libavcodec/mpeg4videodec.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service.\n\n * CVE-2018-13302: In FFmpeg 4.0.1, improper handling of frame types (other than EAC3_FRAME_TYPE_INDEPENDENT) that have multiple independent substreams in the handle_eac3 function in libavformat/movenc.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to a denial of service or possibly unspecified other impact.\n\n * CVE-2018-13303: In FFmpeg 4.0.1, a missing check for failure of a call to init_get_bits8() in the avpriv_ac3_parse_header function in libavcodec/ac3_parser.c may trigger a NULL pointer dereference while converting a crafted AVI file to MPEG4, leading to a denial of service.\n\n * CVE-2018-13304: In libavcodec in FFmpeg 4.0.1, improper maintenance of the consistency between the context profile field and studio_profile in libavcodec may trigger an assertion failure while converting a crafted AVI file to MPEG4, leading to a denial of service, related to error_resilience.c, h263dec.c, and mpeg4videodec.c.\n\n * CVE-2018-13305: In FFmpeg 4.0.1, due to a missing check for negative values of the mquant variable, the vc1_put_blocks_clamped function in libavcodec/vc1_block.c may trigger an out-of-array access while converting a crafted AVI file to MPEG4, leading to an information disclosure or a denial of service.\n\n * CVE-2018-14394: libavformat/movenc.c in FFmpeg before 4.0.2 allows attackers to cause a denial of service (application crash caused by a divide-by-zero error) with a user crafted Waveform audio file.\n\n * CVE-2018-1999011: FFmpeg before commit 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 contains a Buffer Overflow vulnerability in asf_o format demuxer that can result in heap-buffer-overflow that may result in remote code execution. This attack appears to be exploitable via specially crafted ASF file that has to be provided as input to FFmpeg. This vulnerability appears to have been fixed in 2b46ebdbff1d8dec7a3d8ea280a612b91a582869 and later.\n\n * CVE-2018-1999012: FFmpeg before commit 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 contains a CWE-835: Infinite loop vulnerability in pva format demuxer that can result in a Vulnerability that allows attackers to consume excessive amount of resources like CPU and RAM. This attack appear to be exploitable via specially crafted PVA file has to be provided as input. This vulnerability appears to have been fixed in 9807d3976be0e92e4ece3b4b1701be894cd7c2e1 and later.\n\n * CVE-2018-1999013: FFmpeg before commit a7e032a277452366771951e29fd0bf2bd5c029f0 contains a use-after-free vulnerability in the realmedia demuxer that can result in vulnerability allows attacker to read heap memory. This attack appear to be exploitable via specially crafted RM file has to be provided as input. This vulnerability appears to have been fixed in a7e032a277452366771951e29fd0bf2bd5c029f0 and later.\n\n * CVE-2018-1999014: FFmpeg before commit bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 contains an out of array access vulnerability in MXF format demuxer that can result in DoS. This attack appear to be exploitable via specially crafted MXF file which has to be provided as input. This vulnerability appears to have been fixed in bab0716c7f4793ec42e05a5aa7e80d82a0dd4e75 and later.\n\n * CVE-2018-1999015: FFmpeg before commit 5aba5b89d0b1d73164d3b81764828bb8b20ff32a contains an out of array read vulnerability in ASF_F format demuxer that can result in heap memory reading. This attack appear to be exploitable via specially crafted ASF file that has to provided as input. This vulnerability appears to have been fixed in 5aba5b89d0b1d73164d3b81764828bb8b20ff32a and later.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2018-07-21"
|
||
},
|
||
"Updated": {
|
||
"Date": "2018-07-21"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2019-00420",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-19",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-00420",
|
||
"Impact": "High",
|
||
"Public": "20180627"
|
||
},
|
||
{
|
||
"ID": "BDU:2019-02098",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2019-02098",
|
||
"Impact": "High",
|
||
"Public": "20180723"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2018-13300",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13300",
|
||
"Impact": "High",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13301",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13301",
|
||
"Impact": "Low",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13302",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-129",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13302",
|
||
"Impact": "High",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13303",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13303",
|
||
"Impact": "Low",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13304",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-617",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13304",
|
||
"Impact": "Low",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-13305",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-13305",
|
||
"Impact": "High",
|
||
"Public": "20180705"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-14394",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14394",
|
||
"Impact": "Low",
|
||
"Public": "20180719"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1999011",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999011",
|
||
"Impact": "High",
|
||
"Public": "20180723"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1999012",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-835",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999012",
|
||
"Impact": "Low",
|
||
"Public": "20180723"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1999013",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999013",
|
||
"Impact": "Low",
|
||
"Public": "20180723"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1999014",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999014",
|
||
"Impact": "Low",
|
||
"Public": "20180723"
|
||
},
|
||
{
|
||
"ID": "CVE-2018-1999015",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-1999015",
|
||
"Impact": "Low",
|
||
"Public": "20180723"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047001",
|
||
"Comment": "ffmpeg is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047002",
|
||
"Comment": "ffmpeg-doc is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047003",
|
||
"Comment": "ffplay is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047004",
|
||
"Comment": "ffprobe is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047005",
|
||
"Comment": "ffprobe-doc is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047006",
|
||
"Comment": "ffserver-doc is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047007",
|
||
"Comment": "libavcodec-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047008",
|
||
"Comment": "libavcodec-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047009",
|
||
"Comment": "libavcodec58 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047010",
|
||
"Comment": "libavdevice-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047011",
|
||
"Comment": "libavdevice-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047012",
|
||
"Comment": "libavdevice58 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047013",
|
||
"Comment": "libavfilter-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047014",
|
||
"Comment": "libavfilter-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047015",
|
||
"Comment": "libavfilter7 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047016",
|
||
"Comment": "libavformat-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047017",
|
||
"Comment": "libavformat-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047018",
|
||
"Comment": "libavformat58 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047019",
|
||
"Comment": "libavresample-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047020",
|
||
"Comment": "libavresample-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047021",
|
||
"Comment": "libavresample4 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047022",
|
||
"Comment": "libavutil-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047023",
|
||
"Comment": "libavutil-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047024",
|
||
"Comment": "libavutil56 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047025",
|
||
"Comment": "libpostproc-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047026",
|
||
"Comment": "libpostproc-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047027",
|
||
"Comment": "libpostproc55 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047028",
|
||
"Comment": "libswresample-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047029",
|
||
"Comment": "libswresample-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047030",
|
||
"Comment": "libswresample3 is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047031",
|
||
"Comment": "libswscale-devel is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047032",
|
||
"Comment": "libswscale-devel-static is earlier than 2:4.0.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20182047033",
|
||
"Comment": "libswscale5 is earlier than 2:4.0.2-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |