421 lines
20 KiB
JSON
421 lines
20 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20202032",
|
||
"Version": "oval:org.altlinux.errata:def:20202032",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-2032: package `ffmpeg` update to version 4.2.3-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-2032",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-2032",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2020-02828",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2020-02828",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01676",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01676",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01678",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01678",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01740",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01740",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02072",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02072",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02073",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02073",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2019-13312",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13312",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-12284",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20891",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20892",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20896",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20898",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20902",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38090",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38091",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38092",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38093",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38094",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ffmpeg to version 4.2.3-alt1. \nSecurity Fix(es):\n\n * BDU:2020-02828: Уязвимость функции cbs_jpeg_split_fragment мультимедийной библиотеки Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01676: Уязвимость функции filter_frame компонента libavfilter/vf_lenscorrection.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-01678: Уязвимость функции long_term_filter компонента g729postfilter.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-01740: Уязвимость функции latm_write_packet компонента libavformat/latmenc.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02072: Уязвимость функции config_input компонента libavfilter/vf_gblur.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02073: Уязвимость функции filter16_prewitt компонента libavfilter/vf_convolution.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2019-13312: block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer over-read.\n\n * CVE-2020-12284: cbs_jpeg_split_fragment in libavcodec/cbs_jpeg.c in FFmpeg 4.1 and 4.2.2 has a heap-based buffer overflow during JPEG_MARKER_SOS handling because of a missing length check.\n\n * CVE-2020-20891: Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20892: An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.\n\n * CVE-2020-20896: An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.\n\n * CVE-2020-20898: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20902: A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of pseudo-normalized correlation R'(0), that could result in disclosure of information.\n\n * CVE-2021-38090: Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38091: Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38092: Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38093: Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38094: Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-05-28"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-05-28"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2020-02828",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2020-02828",
|
||
"Impact": "Critical",
|
||
"Public": "20191229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01676",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01676",
|
||
"Impact": "High",
|
||
"Public": "20191013"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01678",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01678",
|
||
"Impact": "Low",
|
||
"Public": "20190918"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01740",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01740",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02072",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02072",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02073",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02073",
|
||
"Impact": "High",
|
||
"Public": "20191013"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2019-13312",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13312",
|
||
"Impact": "High",
|
||
"Public": "20190705"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-12284",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-12284",
|
||
"Impact": "Critical",
|
||
"Public": "20200428"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20891",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20892",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20896",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20898",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20902",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
|
||
"Impact": "Low",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38090",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38091",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38092",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38093",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38094",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032001",
|
||
"Comment": "ffmpeg is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032002",
|
||
"Comment": "ffmpeg-doc is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032003",
|
||
"Comment": "ffplay is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032004",
|
||
"Comment": "ffplay-doc is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032005",
|
||
"Comment": "ffprobe is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032006",
|
||
"Comment": "ffprobe-doc is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032007",
|
||
"Comment": "ffserver-doc is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032008",
|
||
"Comment": "libavcodec-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032009",
|
||
"Comment": "libavcodec58 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032010",
|
||
"Comment": "libavdevice-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032011",
|
||
"Comment": "libavdevice58 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032012",
|
||
"Comment": "libavfilter-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032013",
|
||
"Comment": "libavfilter7 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032014",
|
||
"Comment": "libavformat-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032015",
|
||
"Comment": "libavformat58 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032016",
|
||
"Comment": "libavresample-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032017",
|
||
"Comment": "libavresample4 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032018",
|
||
"Comment": "libavutil-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032019",
|
||
"Comment": "libavutil56 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032020",
|
||
"Comment": "libpostproc-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032021",
|
||
"Comment": "libpostproc55 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032022",
|
||
"Comment": "libswresample-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032023",
|
||
"Comment": "libswresample3 is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032024",
|
||
"Comment": "libswscale-devel is earlier than 2:4.2.3-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20202032025",
|
||
"Comment": "libswscale5 is earlier than 2:4.2.3-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |