2024-06-28 13:17:52 +00:00

421 lines
20 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20202032",
"Version": "oval:org.altlinux.errata:def:20202032",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2020-2032: package `ffmpeg` update to version 4.2.3-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2020-2032",
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2032",
"Source": "ALTPU"
},
{
"RefID": "BDU:2020-02828",
"RefURL": "https://bdu.fstec.ru/vul/2020-02828",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01676",
"RefURL": "https://bdu.fstec.ru/vul/2022-01676",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01678",
"RefURL": "https://bdu.fstec.ru/vul/2022-01678",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01740",
"RefURL": "https://bdu.fstec.ru/vul/2022-01740",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02072",
"RefURL": "https://bdu.fstec.ru/vul/2022-02072",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02073",
"RefURL": "https://bdu.fstec.ru/vul/2022-02073",
"Source": "BDU"
},
{
"RefID": "CVE-2019-13312",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13312",
"Source": "CVE"
},
{
"RefID": "CVE-2020-12284",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284",
"Source": "CVE"
},
{
"RefID": "CVE-2020-20891",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
"Source": "CVE"
},
{
"RefID": "CVE-2020-20892",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
"Source": "CVE"
},
{
"RefID": "CVE-2020-20896",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
"Source": "CVE"
},
{
"RefID": "CVE-2020-20898",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
"Source": "CVE"
},
{
"RefID": "CVE-2020-20902",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38090",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38091",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38092",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38093",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
"Source": "CVE"
},
{
"RefID": "CVE-2021-38094",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
"Source": "CVE"
}
],
"Description": "This update upgrades ffmpeg to version 4.2.3-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02828: Уязвимость функции cbs_jpeg_split_fragment мультимедийной библиотеки Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01676: Уязвимость функции filter_frame компонента libavfilter/vf_lenscorrection.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-01678: Уязвимость функции long_term_filter компонента g729postfilter.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-01740: Уязвимость функции latm_write_packet компонента libavformat/latmenc.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02072: Уязвимость функции config_input компонента libavfilter/vf_gblur.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02073: Уязвимость функции filter16_prewitt компонента libavfilter/vf_convolution.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2019-13312: block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer over-read.\n\n * CVE-2020-12284: cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check.\n\n * CVE-2020-20891: Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20892: An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.\n\n * CVE-2020-20896: An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.\n\n * CVE-2020-20898: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20902: A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of pseudo-normalized correlation R'(0), that could result in disclosure of information.\n\n * CVE-2021-38090: Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38091: Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38092: Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38093: Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38094: Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2020-05-28"
},
"Updated": {
"Date": "2020-05-28"
},
"BDUs": [
{
"ID": "BDU:2020-02828",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-02828",
"Impact": "Critical",
"Public": "20191229"
},
{
"ID": "BDU:2022-01676",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-369",
"Href": "https://bdu.fstec.ru/vul/2022-01676",
"Impact": "High",
"Public": "20191013"
},
{
"ID": "BDU:2022-01678",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-01678",
"Impact": "Low",
"Public": "20190918"
},
{
"ID": "BDU:2022-01740",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-01740",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "BDU:2022-02072",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://bdu.fstec.ru/vul/2022-02072",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "BDU:2022-02073",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-02073",
"Impact": "High",
"Public": "20191013"
}
],
"CVEs": [
{
"ID": "CVE-2019-13312",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13312",
"Impact": "High",
"Public": "20190705"
},
{
"ID": "CVE-2020-12284",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284",
"Impact": "Critical",
"Public": "20200428"
},
{
"ID": "CVE-2020-20891",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-120",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2020-20892",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-369",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2020-20896",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2020-20898",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2020-20902",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
"Impact": "Low",
"Public": "20210920"
},
{
"ID": "CVE-2021-38090",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2021-38091",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2021-38092",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2021-38093",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
"Impact": "High",
"Public": "20210920"
},
{
"ID": "CVE-2021-38094",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
"Impact": "High",
"Public": "20210920"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20202032001",
"Comment": "ffmpeg is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032002",
"Comment": "ffmpeg-doc is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032003",
"Comment": "ffplay is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032004",
"Comment": "ffplay-doc is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032005",
"Comment": "ffprobe is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032006",
"Comment": "ffprobe-doc is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032007",
"Comment": "ffserver-doc is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032008",
"Comment": "libavcodec-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032009",
"Comment": "libavcodec58 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032010",
"Comment": "libavdevice-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032011",
"Comment": "libavdevice58 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032012",
"Comment": "libavfilter-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032013",
"Comment": "libavfilter7 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032014",
"Comment": "libavformat-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032015",
"Comment": "libavformat58 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032016",
"Comment": "libavresample-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032017",
"Comment": "libavresample4 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032018",
"Comment": "libavutil-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032019",
"Comment": "libavutil56 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032020",
"Comment": "libpostproc-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032021",
"Comment": "libpostproc55 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032022",
"Comment": "libswresample-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032023",
"Comment": "libswresample3 is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032024",
"Comment": "libswscale-devel is earlier than 2:4.2.3-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20202032025",
"Comment": "libswscale5 is earlier than 2:4.2.3-alt1"
}
]
}
]
}
}
]
}