379 lines
18 KiB
JSON
379 lines
18 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20201014",
|
||
"Version": "oval:org.altlinux.errata:def:20201014",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2020-1014: package `ffmpeg` update to version 4.2.2-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c10f1"
|
||
],
|
||
"Products": [
|
||
"ALT SP Workstation",
|
||
"ALT SP Server"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2020-1014",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2020-1014",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01676",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01676",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01678",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01678",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01740",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01740",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02072",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02072",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02073",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02073",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20891",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20892",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20896",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20898",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2020-20902",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38090",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38091",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38092",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38093",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-38094",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades ffmpeg to version 4.2.2-alt1. \nSecurity Fix(es):\n\n * BDU:2022-01676: Уязвимость функции filter_frame компонента libavfilter/vf_lenscorrection.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-01678: Уязвимость функции long_term_filter компонента g729postfilter.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-01740: Уязвимость функции latm_write_packet компонента libavformat/latmenc.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02072: Уязвимость функции config_input компонента libavfilter/vf_gblur.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-02073: Уязвимость функции filter16_prewitt компонента libavfilter/vf_convolution.c мультимедийной библиотеки FFmpeg, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2020-20891: Buffer Overflow vulnerability in function config_input in libavfilter/vf_gblur.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20892: An issue was discovered in function filter_frame in libavfilter/vf_lenscorrection.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a division by zero.\n\n * CVE-2020-20896: An issue was discovered in function latm_write_packet in libavformat/latmenc.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts due to a Null pointer dereference.\n\n * CVE-2020-20898: Integer Overflow vulnerability in function filter16_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2020-20902: A CWE-125: Out-of-bounds read vulnerability exists in long_term_filter function in g729postfilter.c in FFmpeg 4.2.1 during computation of the denominator of pseudo-normalized correlation R'(0), that could result in disclosure of information.\n\n * CVE-2021-38090: Integer Overflow vulnerability in function filter16_roberts in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38091: Integer Overflow vulnerability in function filter16_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38092: Integer Overflow vulnerability in function filter_prewitt in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38093: Integer Overflow vulnerability in function filter_robert in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.\n\n * CVE-2021-38094: Integer Overflow vulnerability in function filter_sobel in libavfilter/vf_convolution.c in Ffmpeg 4.2.1, allows attackers to cause a Denial of Service or other unspecified impacts.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "High",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2020-01-09"
|
||
},
|
||
"Updated": {
|
||
"Date": "2020-01-09"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-01676",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01676",
|
||
"Impact": "High",
|
||
"Public": "20191013"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01678",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01678",
|
||
"Impact": "Low",
|
||
"Public": "20190918"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01740",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01740",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02072",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02072",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02073",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02073",
|
||
"Impact": "High",
|
||
"Public": "20191013"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2020-20891",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-120",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20891",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20892",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-369",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20892",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20896",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20896",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20898",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20898",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2020-20902",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2020-20902",
|
||
"Impact": "Low",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38090",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38090",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38091",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38091",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38092",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38092",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38093",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38093",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-38094",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-190",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-38094",
|
||
"Impact": "High",
|
||
"Public": "20210920"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:10",
|
||
"cpe:/o:alt:spserver:10"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:4001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014001",
|
||
"Comment": "ffmpeg is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014002",
|
||
"Comment": "ffmpeg-doc is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014003",
|
||
"Comment": "ffplay is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014004",
|
||
"Comment": "ffplay-doc is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014005",
|
||
"Comment": "ffprobe is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014006",
|
||
"Comment": "ffprobe-doc is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014007",
|
||
"Comment": "ffserver-doc is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014008",
|
||
"Comment": "libavcodec-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014009",
|
||
"Comment": "libavcodec58 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014010",
|
||
"Comment": "libavdevice-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014011",
|
||
"Comment": "libavdevice58 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014012",
|
||
"Comment": "libavfilter-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014013",
|
||
"Comment": "libavfilter7 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014014",
|
||
"Comment": "libavformat-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014015",
|
||
"Comment": "libavformat58 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014016",
|
||
"Comment": "libavresample-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014017",
|
||
"Comment": "libavresample4 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014018",
|
||
"Comment": "libavutil-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014019",
|
||
"Comment": "libavutil56 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014020",
|
||
"Comment": "libpostproc-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014021",
|
||
"Comment": "libpostproc55 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014022",
|
||
"Comment": "libswresample-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014023",
|
||
"Comment": "libswresample3 is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014024",
|
||
"Comment": "libswscale-devel is earlier than 2:4.2.2-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20201014025",
|
||
"Comment": "libswscale5 is earlier than 2:4.2.2-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |