vuln-list-alt/oval/c9f2/ALT-PU-2019-3079/definitions.json
2024-06-28 13:17:52 +00:00

470 lines
24 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20193079",
"Version": "oval:org.altlinux.errata:def:20193079",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-3079: package `libxml2` update to version 2.9.10-alt2",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-3079",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-3079",
"Source": "ALTPU"
},
{
"RefID": "BDU:2018-00015",
"RefURL": "https://bdu.fstec.ru/vul/2018-00015",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00016",
"RefURL": "https://bdu.fstec.ru/vul/2018-00016",
"Source": "BDU"
},
{
"RefID": "BDU:2018-00017",
"RefURL": "https://bdu.fstec.ru/vul/2018-00017",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00518",
"RefURL": "https://bdu.fstec.ru/vul/2019-00518",
"Source": "BDU"
},
{
"RefID": "BDU:2019-00734",
"RefURL": "https://bdu.fstec.ru/vul/2019-00734",
"Source": "BDU"
},
{
"RefID": "BDU:2019-04730",
"RefURL": "https://bdu.fstec.ru/vul/2019-04730",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04513",
"RefURL": "https://bdu.fstec.ru/vul/2020-04513",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03125",
"RefURL": "https://bdu.fstec.ru/vul/2021-03125",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03356",
"RefURL": "https://bdu.fstec.ru/vul/2021-03356",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05256",
"RefURL": "https://bdu.fstec.ru/vul/2021-05256",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07417",
"RefURL": "https://bdu.fstec.ru/vul/2022-07417",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07418",
"RefURL": "https://bdu.fstec.ru/vul/2022-07418",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00218",
"RefURL": "https://bdu.fstec.ru/vul/2023-00218",
"Source": "BDU"
},
{
"RefID": "CVE-2016-4658",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658",
"Source": "CVE"
},
{
"RefID": "CVE-2017-15412",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-15412",
"Source": "CVE"
},
{
"RefID": "CVE-2017-18258",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5130",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5130",
"Source": "CVE"
},
{
"RefID": "CVE-2017-5969",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-5969",
"Source": "CVE"
},
{
"RefID": "CVE-2017-7376",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-7376",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9047",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9048",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9049",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049",
"Source": "CVE"
},
{
"RefID": "CVE-2017-9050",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14404",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404",
"Source": "CVE"
},
{
"RefID": "CVE-2018-14567",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-14567",
"Source": "CVE"
},
{
"RefID": "CVE-2018-9251",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2018-9251",
"Source": "CVE"
},
{
"RefID": "CVE-2019-19956",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956",
"Source": "CVE"
}
],
"Description": "This update upgrades libxml2 to version 2.9.10-alt2. \nSecurity Fix(es):\n\n * BDU:2018-00015: Уязвимость библиотеки для анализа XML-файлов libxml2, связанная с некорректным вычислением размера буфера для значения порта, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2018-00016: Уязвимость функции xmlDictComputeFastKey (dict.c) библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2018-00017: Уязвимость функции xmlDictAddString (dict.c) библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00518: Уязвимость функции xpath.c:xmlXPathCompOpEval() библиотеки libxml2, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-00734: Уязвимость функции xz_decomp библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2019-04730: Уязвимость библиотеки libxml2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2020-04513: Уязвимость компонента parser.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-03125: Уязвимость библиотеки libxml2 операционных систем iPhoneOS, tvOS, watchOS, macOS, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-03356: Уязвимость функции xz_head компонента xzlib.c библиотеки Libxml2, связанная с недостатком механизма распределения ресурсов, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-05256: Уязвимость компонента xmlmemory.c программного обеспечения для анализа XML-документов libxml2, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07417: Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-07418: Уязвимость реализации функции xmlSnprintfElementContent() библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-00218: Уязвимость библиотеки Libxml2, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2016-4658: xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.\n\n * CVE-2017-15412: Use after free in libxml2 before 2.9.5, as used in Google Chrome prior to 63.0.3239.84 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.\n\n * CVE-2017-18258: The xz_head function in xzlib.c in libxml2 before 2.9.6 allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file.\n\n * CVE-2017-5130: An integer overflow in xmlmemory.c in libxml2 before 2.9.5, as used in Google Chrome prior to 62.0.3202.62 and other products, allowed a remote attacker to potentially exploit heap corruption via a crafted XML file.\n\n * CVE-2017-5969: libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states \"I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser.\n\n * CVE-2017-7376: Buffer overflow in libxml2 allows remote attackers to execute arbitrary code by leveraging an incorrect limit for port values when handling redirects.\n\n * CVE-2017-9047: A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content-\u003etype is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content-\u003eprefix is appended to buf (if it actually fits) whereupon (ii) content-\u003ename is written to the buffer. However, the check for whether the content-\u003ename actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about \"size\" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.\n\n * CVE-2017-9048: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 \u003c size. This vulnerability causes programs that use libxml2, such as PHP, to crash.\n\n * CVE-2017-9049: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.\n\n * CVE-2017-9050: libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.\n\n * CVE-2018-14404: A NULL pointer dereference vulnerability exists in the xpath.c:xmlXPathCompOpEval() function of libxml2 through 2.9.8 when parsing an invalid XPath expression in the XPATH_OP_AND or XPATH_OP_OR case. Applications processing untrusted XSL format inputs with the use of the libxml2 library may be vulnerable to a denial of service attack due to a crash of the application.\n\n * CVE-2018-14567: libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251.\n\n * CVE-2018-9251: The xz_decomp function in xzlib.c in libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035.\n\n * CVE-2019-19956: xmlParseBalancedChunkMemoryRecover in parser.c in libxml2 before 2.9.10 has a memory leak related to newDoc-\u003eoldNs.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-11-03"
},
"Updated": {
"Date": "2019-11-03"
},
"BDUs": [
{
"ID": "BDU:2018-00015",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-682",
"Href": "https://bdu.fstec.ru/vul/2018-00015",
"Impact": "Low",
"Public": "20170417"
},
{
"ID": "BDU:2018-00016",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00016",
"Impact": "High",
"Public": "20170515"
},
{
"ID": "BDU:2018-00017",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-125",
"Href": "https://bdu.fstec.ru/vul/2018-00017",
"Impact": "High",
"Public": "20170515"
},
{
"ID": "BDU:2019-00518",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2019-00518",
"Impact": "Low",
"Public": "20180618"
},
{
"ID": "BDU:2019-00734",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-400",
"Href": "https://bdu.fstec.ru/vul/2019-00734",
"Impact": "Low",
"Public": "20180403"
},
{
"ID": "BDU:2019-04730",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://bdu.fstec.ru/vul/2019-04730",
"Impact": "Low",
"Public": "20180403"
},
{
"ID": "BDU:2020-04513",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CWE": "CWE-772",
"Href": "https://bdu.fstec.ru/vul/2020-04513",
"Impact": "Low",
"Public": "20190807"
},
{
"ID": "BDU:2021-03125",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-03125",
"Impact": "Critical",
"Public": "20160925"
},
{
"ID": "BDU:2021-03356",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://bdu.fstec.ru/vul/2021-03356",
"Impact": "Low",
"Public": "20170901"
},
{
"ID": "BDU:2021-05256",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05256",
"Impact": "High",
"Public": "20171028"
},
{
"ID": "BDU:2022-07417",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-121",
"Href": "https://bdu.fstec.ru/vul/2022-07417",
"Impact": "High",
"Public": "20170515"
},
{
"ID": "BDU:2022-07418",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119, CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-07418",
"Impact": "High",
"Public": "20170515"
},
{
"ID": "BDU:2023-00218",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00218",
"Impact": "Low",
"Public": "20170212"
}
],
"CVEs": [
{
"ID": "CVE-2016-4658",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2016-4658",
"Impact": "Critical",
"Public": "20160925"
},
{
"ID": "CVE-2017-15412",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-15412",
"Impact": "High",
"Public": "20180828"
},
{
"ID": "CVE-2017-18258",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-18258",
"Impact": "Low",
"Public": "20180408"
},
{
"ID": "CVE-2017-5130",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5130",
"Impact": "High",
"Public": "20180207"
},
{
"ID": "CVE-2017-5969",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-5969",
"Impact": "Low",
"Public": "20170411"
},
{
"ID": "CVE-2017-7376",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-7376",
"Impact": "Critical",
"Public": "20180219"
},
{
"ID": "CVE-2017-9047",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9047",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "CVE-2017-9048",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9048",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "CVE-2017-9049",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9049",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "CVE-2017-9050",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-9050",
"Impact": "High",
"Public": "20170518"
},
{
"ID": "CVE-2018-14404",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14404",
"Impact": "High",
"Public": "20180719"
},
{
"ID": "CVE-2018-14567",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-14567",
"Impact": "Low",
"Public": "20180816"
},
{
"ID": "CVE-2018-9251",
"CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-835",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2018-9251",
"Impact": "Low",
"Public": "20180404"
},
{
"ID": "CVE-2019-19956",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-19956",
"Impact": "High",
"Public": "20191224"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20193079001",
"Comment": "libxml2 is earlier than 1:2.9.10-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193079002",
"Comment": "libxml2-devel is earlier than 1:2.9.10-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193079003",
"Comment": "libxml2-doc is earlier than 1:2.9.10-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193079004",
"Comment": "python-module-libxml2 is earlier than 1:2.9.10-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193079005",
"Comment": "python3-module-libxml2 is earlier than 1:2.9.10-alt2"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193079006",
"Comment": "xml-utils is earlier than 1:2.9.10-alt2"
}
]
}
]
}
}
]
}