2024-12-12 21:07:30 +00:00

1045 lines
51 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20212713",
"Version": "oval:org.altlinux.errata:def:20212713",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2021-2713: package `qemu` update to version 6.1.0-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p11"
],
"Products": [
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2021-2713",
"RefURL": "https://errata.altlinux.org/ALT-PU-2021-2713",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-06303",
"RefURL": "https://bdu.fstec.ru/vul/2021-06303",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06305",
"RefURL": "https://bdu.fstec.ru/vul/2021-06305",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06306",
"RefURL": "https://bdu.fstec.ru/vul/2021-06306",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06308",
"RefURL": "https://bdu.fstec.ru/vul/2021-06308",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05693",
"RefURL": "https://bdu.fstec.ru/vul/2022-05693",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05706",
"RefURL": "https://bdu.fstec.ru/vul/2022-05706",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05775",
"RefURL": "https://bdu.fstec.ru/vul/2022-05775",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05783",
"RefURL": "https://bdu.fstec.ru/vul/2022-05783",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05840",
"RefURL": "https://bdu.fstec.ru/vul/2022-05840",
"Source": "BDU"
},
{
"RefID": "BDU:2023-01705",
"RefURL": "https://bdu.fstec.ru/vul/2023-01705",
"Source": "BDU"
},
{
"RefID": "CVE-2020-35503",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-35503",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3507",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3507",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3527",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3527",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3544",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3544",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3545",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3545",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3546",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3546",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3582",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3582",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3607",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3607",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3608",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3608",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3682",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3682",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3713",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3713",
"Source": "CVE"
}
],
"Description": "This update upgrades qemu to version 6.1.0-alt1. \nSecurity Fix(es):\n\n * BDU:2021-06303: Уязвимость функции virgl_cmd_get_capset_info() компонента contrib/vhost-user-gpu/virgl.c эмулятора аппаратного обеспечения QEMU, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2021-06305: Уязвимость компонентов contrib/vhost-user-gpu/vhost-user-gpu.c и contrib/vhost-user-gpu/virgl.c эмулятора аппаратного обеспечения QEMU, связанная с неправильным освобождением памяти перед удалением последний ссылки, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2021-06306: Уязвимость эмуляции устройства UAS эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2021-06308: Уязвимость команды VIRTIO_GPU_CMD_GET_CAPSET эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05693: Уязвимость эмуляции USB-перенаправителя эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05706: Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с доступом к неинициализированному указателю, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05775: Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05783: Уязвимость команды PVRDMA_CMD_CREATE_MR эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-05840: Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2023-01705: Уязвимость функции fdctrl_transfer_handler() компонента hw/block/fdc.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * CVE-2020-35503: A NULL pointer dereference flaw was found in the megasas-gen2 SCSI host bus adapter emulation of QEMU in versions before and including 6.0. This issue occurs in the megasas_command_cancelled() callback function while dropping a SCSI request. This flaw allows a privileged guest user to crash the QEMU process on the host, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3507: A heap buffer overflow was found in the floppy disk emulator of QEMU up to 6.0.0 (including). It could occur in fdctrl_transfer_handler() in hw/block/fdc.c while processing DMA read data transfers from the floppy drive to the guest system. A privileged guest user could use this flaw to crash the QEMU process on the host resulting in DoS scenario, or potential information leakage from the host memory.\n\n * CVE-2021-3527: A flaw was found in the USB redirector device (usb-redir) of QEMU. Small USB packets are combined into a single, large transfer request, to reduce the overhead and improve performance. The combined size of the bulk transfer is used to dynamically allocate a variable length array (VLA) on the stack without proper validation. Since the total size is not bounded, a malicious guest could use this flaw to influence the array length and cause the QEMU process to perform an excessive allocation on the stack, resulting in a denial of service.\n\n * CVE-2021-3544: Several memory leaks were found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. They exist in contrib/vhost-user-gpu/vhost-user-gpu.c and contrib/vhost-user-gpu/virgl.c due to improper release of memory (i.e., free) after effective lifetime.\n\n * CVE-2021-3545: An information disclosure vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw exists in virgl_cmd_get_capset_info() in contrib/vhost-user-gpu/virgl.c and could occur due to the read of uninitialized memory. A malicious guest could exploit this issue to leak memory from the host.\n\n * CVE-2021-3546: An out-of-bounds write vulnerability was found in the virtio vhost-user GPU device (vhost-user-gpu) of QEMU in versions up to and including 6.0. The flaw occurs while processing the 'VIRTIO_GPU_CMD_GET_CAPSET' command from the guest. It could allow a privileged guest user to crash the QEMU process on the host, resulting in a denial of service condition, or potential code execution with the privileges of the QEMU process.\n\n * CVE-2021-3582: A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. The issue occurs while handling a \"PVRDMA_CMD_CREATE_MR\" command due to improper memory remapping (mremap). This flaw allows a malicious guest to crash the QEMU process on the host. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3607: An integer overflow was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest due to improper input validation. This flaw allows a privileged guest user to make QEMU allocate a large amount of memory, resulting in a denial of service. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3608: A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device in versions prior to 6.1.0. The issue occurs while handling a \"PVRDMA_REG_DSRHIGH\" write from the guest and may result in a crash of QEMU or cause undefined behavior due to the access of an uninitialized pointer. The highest threat from this vulnerability is to system availability.\n\n * CVE-2021-3682: A flaw was found in the USB redirector device emulation of QEMU in versions prior to 6.1.0-rc2. It occurs when dropping packets during a bulk transfer from a SPICE client due to the packet queue being full. A malicious SPICE client could use this flaw to make QEMU call free() with faked heap chunk metadata, resulting in a crash of QEMU or potential code execution with the privileges of the QEMU process on the host.\n\n * CVE-2021-3713: An out-of-bounds write flaw was found in the UAS (USB Attached SCSI) device emulation of QEMU in versions prior to 6.2.0-rc0. The device uses the guest supplied stream number unchecked, which can lead to out-of-bounds access to the UASDevice-\u003edata3 and UASDevice-\u003estatus3 fields. A malicious guest user could use this flaw to crash QEMU or potentially achieve code execution with the privileges of the QEMU process on the host.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2021-09-03"
},
"Updated": {
"Date": "2021-09-03"
},
"BDUs": [
{
"ID": "BDU:2021-06303",
"CVSS": "AV:L/AC:L/Au:S/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-200",
"Href": "https://bdu.fstec.ru/vul/2021-06303",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-06305",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://bdu.fstec.ru/vul/2021-06305",
"Impact": "Low",
"Public": "20210510"
},
{
"ID": "BDU:2021-06306",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-06306",
"Impact": "High",
"Public": "20210817"
},
{
"ID": "BDU:2021-06308",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-06308",
"Impact": "High",
"Public": "20210510"
},
{
"ID": "BDU:2022-05693",
"CVSS": "AV:N/AC:M/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-763",
"Href": "https://bdu.fstec.ru/vul/2022-05693",
"Impact": "High",
"Public": "20210719"
},
{
"ID": "BDU:2022-05706",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-824",
"Href": "https://bdu.fstec.ru/vul/2022-05706",
"Impact": "Low",
"Public": "20210617"
},
{
"ID": "BDU:2022-05775",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2022-05775",
"Impact": "Low",
"Public": "20210617"
},
{
"ID": "BDU:2022-05783",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-05783",
"Impact": "Low",
"Public": "20210531"
},
{
"ID": "BDU:2022-05840",
"CVSS": "AV:L/AC:L/Au:S/C:N/I:N/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://bdu.fstec.ru/vul/2022-05840",
"Impact": "Low",
"Public": "20210430"
},
{
"ID": "BDU:2023-01705",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2023-01705",
"Impact": "Low",
"Public": "20210419"
}
],
"CVEs": [
{
"ID": "CVE-2020-35503",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-35503",
"Impact": "Low",
"Public": "20210602"
},
{
"ID": "CVE-2021-3507",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3507",
"Impact": "Low",
"Public": "20210506"
},
{
"ID": "CVE-2021-3527",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"CWE": "CWE-770",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3527",
"Impact": "Low",
"Public": "20210526"
},
{
"ID": "CVE-2021-3544",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-401",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3544",
"Impact": "Low",
"Public": "20210602"
},
{
"ID": "CVE-2021-3545",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"CWE": "CWE-908",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3545",
"Impact": "Low",
"Public": "20210602"
},
{
"ID": "CVE-2021-3546",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3546",
"Impact": "High",
"Public": "20210602"
},
{
"ID": "CVE-2021-3582",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-119",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3582",
"Impact": "Low",
"Public": "20220325"
},
{
"ID": "CVE-2021-3607",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-190",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3607",
"Impact": "Low",
"Public": "20220224"
},
{
"ID": "CVE-2021-3608",
"CVSS": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:N/I:N/A:H",
"CWE": "CWE-824",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3608",
"Impact": "Low",
"Public": "20220224"
},
{
"ID": "CVE-2021-3682",
"CVSS": "AV:N/AC:M/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3682",
"Impact": "High",
"Public": "20210805"
},
{
"ID": "CVE-2021-3713",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3713",
"Impact": "High",
"Public": "20210825"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:container:11"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20212713001",
"Comment": "qemu is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713002",
"Comment": "qemu-audio-alsa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713003",
"Comment": "qemu-audio-oss is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713004",
"Comment": "qemu-audio-pa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713005",
"Comment": "qemu-audio-sdl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713006",
"Comment": "qemu-audio-spice is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713007",
"Comment": "qemu-aux is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713008",
"Comment": "qemu-block-curl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713009",
"Comment": "qemu-block-dmg is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713010",
"Comment": "qemu-block-gluster is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713011",
"Comment": "qemu-block-iscsi is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713012",
"Comment": "qemu-block-nfs is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713013",
"Comment": "qemu-block-rbd is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713014",
"Comment": "qemu-block-ssh is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713015",
"Comment": "qemu-char-spice is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713016",
"Comment": "qemu-common is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713017",
"Comment": "qemu-device-display-qxl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713018",
"Comment": "qemu-device-display-vhost-user-gpu is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713019",
"Comment": "qemu-device-display-virtio-gpu is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713020",
"Comment": "qemu-device-display-virtio-gpu-ccw is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713021",
"Comment": "qemu-device-display-virtio-gpu-gl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713022",
"Comment": "qemu-device-display-virtio-gpu-pci is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713023",
"Comment": "qemu-device-display-virtio-gpu-pci-gl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713024",
"Comment": "qemu-device-display-virtio-vga is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713025",
"Comment": "qemu-device-display-virtio-vga-gl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713026",
"Comment": "qemu-device-usb-host is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713027",
"Comment": "qemu-device-usb-redirect is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713028",
"Comment": "qemu-device-usb-smartcard is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713029",
"Comment": "qemu-doc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713030",
"Comment": "qemu-guest-agent is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713031",
"Comment": "qemu-img is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713032",
"Comment": "qemu-kvm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713033",
"Comment": "qemu-kvm-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713034",
"Comment": "qemu-pr-helper is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713035",
"Comment": "qemu-system is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713036",
"Comment": "qemu-system-aarch64 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713037",
"Comment": "qemu-system-aarch64-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713038",
"Comment": "qemu-system-alpha is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713039",
"Comment": "qemu-system-alpha-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713040",
"Comment": "qemu-system-arm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713041",
"Comment": "qemu-system-arm-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713042",
"Comment": "qemu-system-avr is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713043",
"Comment": "qemu-system-avr-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713044",
"Comment": "qemu-system-cris is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713045",
"Comment": "qemu-system-cris-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713046",
"Comment": "qemu-system-hppa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713047",
"Comment": "qemu-system-hppa-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713048",
"Comment": "qemu-system-m68k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713049",
"Comment": "qemu-system-m68k-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713050",
"Comment": "qemu-system-microblaze is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713051",
"Comment": "qemu-system-microblaze-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713052",
"Comment": "qemu-system-mips is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713053",
"Comment": "qemu-system-mips-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713054",
"Comment": "qemu-system-nios2 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713055",
"Comment": "qemu-system-nios2-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713056",
"Comment": "qemu-system-or1k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713057",
"Comment": "qemu-system-or1k-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713058",
"Comment": "qemu-system-ppc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713059",
"Comment": "qemu-system-ppc-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713060",
"Comment": "qemu-system-riscv is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713061",
"Comment": "qemu-system-riscv-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713062",
"Comment": "qemu-system-rx is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713063",
"Comment": "qemu-system-rx-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713064",
"Comment": "qemu-system-s390x is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713065",
"Comment": "qemu-system-s390x-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713066",
"Comment": "qemu-system-sh4 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713067",
"Comment": "qemu-system-sh4-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713068",
"Comment": "qemu-system-sparc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713069",
"Comment": "qemu-system-sparc-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713070",
"Comment": "qemu-system-tricore is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713071",
"Comment": "qemu-system-tricore-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713072",
"Comment": "qemu-system-x86 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713073",
"Comment": "qemu-system-x86-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713074",
"Comment": "qemu-system-xtensa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713075",
"Comment": "qemu-system-xtensa-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713076",
"Comment": "qemu-tests is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713077",
"Comment": "qemu-tools is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713078",
"Comment": "qemu-ui-curses is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713079",
"Comment": "qemu-ui-egl-headless is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713080",
"Comment": "qemu-ui-gtk is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713081",
"Comment": "qemu-ui-opengl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713082",
"Comment": "qemu-ui-sdl is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713083",
"Comment": "qemu-ui-spice-app is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713084",
"Comment": "qemu-ui-spice-core is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713085",
"Comment": "qemu-user is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713086",
"Comment": "qemu-user-aarch64 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713087",
"Comment": "qemu-user-alpha is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713088",
"Comment": "qemu-user-arm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713089",
"Comment": "qemu-user-avr is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713090",
"Comment": "qemu-user-binfmt is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713091",
"Comment": "qemu-user-binfmt-aarch64 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713092",
"Comment": "qemu-user-binfmt-alpha is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713093",
"Comment": "qemu-user-binfmt-arm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713094",
"Comment": "qemu-user-binfmt-avr is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713095",
"Comment": "qemu-user-binfmt-cris is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713096",
"Comment": "qemu-user-binfmt-hexagon is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713097",
"Comment": "qemu-user-binfmt-hppa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713098",
"Comment": "qemu-user-binfmt-m68k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713099",
"Comment": "qemu-user-binfmt-microblaze is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713100",
"Comment": "qemu-user-binfmt-mips is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713101",
"Comment": "qemu-user-binfmt-nios2 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713102",
"Comment": "qemu-user-binfmt-or1k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713103",
"Comment": "qemu-user-binfmt-ppc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713104",
"Comment": "qemu-user-binfmt-riscv is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713105",
"Comment": "qemu-user-binfmt-rx is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713106",
"Comment": "qemu-user-binfmt-s390x is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713107",
"Comment": "qemu-user-binfmt-sh4 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713108",
"Comment": "qemu-user-binfmt-sparc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713109",
"Comment": "qemu-user-binfmt-tricore is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713110",
"Comment": "qemu-user-binfmt-x86 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713111",
"Comment": "qemu-user-binfmt-xtensa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713112",
"Comment": "qemu-user-cris is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713113",
"Comment": "qemu-user-hexagon is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713114",
"Comment": "qemu-user-hppa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713115",
"Comment": "qemu-user-m68k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713116",
"Comment": "qemu-user-microblaze is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713117",
"Comment": "qemu-user-mips is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713118",
"Comment": "qemu-user-nios2 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713119",
"Comment": "qemu-user-or1k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713120",
"Comment": "qemu-user-ppc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713121",
"Comment": "qemu-user-riscv is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713122",
"Comment": "qemu-user-rx is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713123",
"Comment": "qemu-user-s390x is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713124",
"Comment": "qemu-user-sh4 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713125",
"Comment": "qemu-user-sparc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713126",
"Comment": "qemu-user-static is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713127",
"Comment": "qemu-user-static-aarch64 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713128",
"Comment": "qemu-user-static-alpha is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713129",
"Comment": "qemu-user-static-arm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713130",
"Comment": "qemu-user-static-avr is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713131",
"Comment": "qemu-user-static-binfmt is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713132",
"Comment": "qemu-user-static-binfmt-aarch64 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713133",
"Comment": "qemu-user-static-binfmt-alpha is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713134",
"Comment": "qemu-user-static-binfmt-arm is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713135",
"Comment": "qemu-user-static-binfmt-avr is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713136",
"Comment": "qemu-user-static-binfmt-cris is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713137",
"Comment": "qemu-user-static-binfmt-hexagon is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713138",
"Comment": "qemu-user-static-binfmt-hppa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713139",
"Comment": "qemu-user-static-binfmt-m68k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713140",
"Comment": "qemu-user-static-binfmt-microblaze is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713141",
"Comment": "qemu-user-static-binfmt-mips is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713142",
"Comment": "qemu-user-static-binfmt-nios2 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713143",
"Comment": "qemu-user-static-binfmt-or1k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713144",
"Comment": "qemu-user-static-binfmt-ppc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713145",
"Comment": "qemu-user-static-binfmt-riscv is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713146",
"Comment": "qemu-user-static-binfmt-rx is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713147",
"Comment": "qemu-user-static-binfmt-s390x is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713148",
"Comment": "qemu-user-static-binfmt-sh4 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713149",
"Comment": "qemu-user-static-binfmt-sparc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713150",
"Comment": "qemu-user-static-binfmt-tricore is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713151",
"Comment": "qemu-user-static-binfmt-x86 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713152",
"Comment": "qemu-user-static-binfmt-xtensa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713153",
"Comment": "qemu-user-static-cris is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713154",
"Comment": "qemu-user-static-hexagon is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713155",
"Comment": "qemu-user-static-hppa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713156",
"Comment": "qemu-user-static-m68k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713157",
"Comment": "qemu-user-static-microblaze is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713158",
"Comment": "qemu-user-static-mips is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713159",
"Comment": "qemu-user-static-nios2 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713160",
"Comment": "qemu-user-static-or1k is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713161",
"Comment": "qemu-user-static-ppc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713162",
"Comment": "qemu-user-static-riscv is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713163",
"Comment": "qemu-user-static-rx is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713164",
"Comment": "qemu-user-static-s390x is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713165",
"Comment": "qemu-user-static-sh4 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713166",
"Comment": "qemu-user-static-sparc is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713167",
"Comment": "qemu-user-static-tricore is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713168",
"Comment": "qemu-user-static-x86 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713169",
"Comment": "qemu-user-static-xtensa is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713170",
"Comment": "qemu-user-tricore is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713171",
"Comment": "qemu-user-x86 is earlier than 0:6.1.0-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20212713172",
"Comment": "qemu-user-xtensa is earlier than 0:6.1.0-alt1"
}
]
}
]
}
}
]
}