534 lines
27 KiB
JSON
534 lines
27 KiB
JSON
{
|
|
"Definition": [
|
|
{
|
|
"ID": "oval:org.altlinux.errata:def:20172226",
|
|
"Version": "oval:org.altlinux.errata:def:20172226",
|
|
"Class": "patch",
|
|
"Metadata": {
|
|
"Title": "ALT-PU-2017-2226: package `ffmpeg` update to version 3.3.4-alt1",
|
|
"AffectedList": [
|
|
{
|
|
"Family": "unix",
|
|
"Platforms": [
|
|
"ALT Linux branch p9"
|
|
],
|
|
"Products": [
|
|
"ALT Server",
|
|
"ALT Virtualization Server",
|
|
"ALT Workstation",
|
|
"ALT Workstation K",
|
|
"ALT Education",
|
|
"Simply Linux",
|
|
"Starterkit"
|
|
]
|
|
}
|
|
],
|
|
"References": [
|
|
{
|
|
"RefID": "ALT-PU-2017-2226",
|
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2017-2226",
|
|
"Source": "ALTPU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02085",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02085",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02086",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02086",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02089",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02089",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02090",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02090",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02091",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02091",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02092",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02092",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02093",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02093",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02297",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02297",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "BDU:2017-02298",
|
|
"RefURL": "https://bdu.fstec.ru/vul/2017-02298",
|
|
"Source": "BDU"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14054",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14054",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14055",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14055",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14056",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14056",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14057",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14057",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14058",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14058",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14059",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14059",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14169",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14169",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14170",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14170",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14171",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14171",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14222",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14222",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14223",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14223",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14225",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14225",
|
|
"Source": "CVE"
|
|
},
|
|
{
|
|
"RefID": "CVE-2017-14767",
|
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2017-14767",
|
|
"Source": "CVE"
|
|
}
|
|
],
|
|
"Description": "This update upgrades ffmpeg to version 3.3.4-alt1. \nSecurity Fix(es):\n\n * BDU:2017-02085: Уязвимость функции nsv_parse_NSVf_header в компоненте nsvdec.c (libavformat/nsvdec.c) мультимедийной библиотеки FFmpeg, позволяющая нарушителю вызвать расход вычислительных ресурсов и отказ в обслуживании\n\n * BDU:2017-02086: Уязвимость функции mxf_read_index_entry_array (libavformat/mxfdec.c) мультимедийной библиотеки FFmpeg, позволяющая нарушителю вызвать расход вычислительных ресурсов и отказ в обслуживании\n\n * BDU:2017-02089: Уязвимость функции cine_read_header мультимедийной библиотеки FFmpeg, позволяющая нарушителю вызвать расходование памяти и отказ в обслуживании\n\n * BDU:2017-02090: Уязвимость функции asf_read_marker мультимедийной библиотеки FFmpeg, позволяющая нарушителю вызвать расходование памяти и отказ в обслуживании\n\n * BDU:2017-02091: Уязвимость функции rl2_read_header мультимедийной библиотеки Ffmpeg (libavformat/rl2.c), позволяющая нарушителю вызвать расходование памяти и отказ в обслуживании\n\n * BDU:2017-02092: Уязвимость функции mv_read_header мультимедийной библиотеки Ffmpeg (libavformat/mvdec.c), позволяющая нарушителю вызвать расходование памяти и отказ в обслуживании\n\n * BDU:2017-02093: Уязвимость функции ivr_read_header мультимедийной библиотеки Ffmpeg (libavformat/rmdec.c), позволяющая нарушителю вызвать расходование памяти и отказ в обслуживании\n\n * BDU:2017-02297: Уязвимость функции asf_build_simple_index() мультимедийной библиотеки FFmpeg (libavformat/asfdec_f.c), позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2017-02298: Уязвимость функции read_tfra() мультимедийной библиотеки FFmpeg (libavformat/mov.c), позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2017-14054: In libavformat/rmdec.c in FFmpeg 3.3.3, a DoS in ivr_read_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted IVR file, which claims a large \"len\" field in the header but does not contain sufficient backing data, is provided, the first type==4 loop would consume huge CPU resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14055: In libavformat/mvdec.c in FFmpeg 3.3.3, a DoS in mv_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MV file, which claims a large \"nb_frames\" field in the header but does not contain sufficient backing data, is provided, the loop over the frames would consume huge CPU and memory resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14056: In libavformat/rl2.c in FFmpeg 3.3.3, a DoS in rl2_read_header() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted RL2 file, which claims a large \"frame_count\" field in the header but does not contain sufficient backing data, is provided, the loops (for offset and size tables) would consume huge CPU and memory resources, since there is no EOF check inside these loops.\n\n * CVE-2017-14057: In FFmpeg 3.3.3, a DoS in asf_read_marker() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted ASF file, which claims a large \"name_len\" or \"count\" field in the header but does not contain sufficient backing data, is provided, the loops over the name and markers would consume huge CPU and memory resources, since there is no EOF check inside these loops.\n\n * CVE-2017-14058: In FFmpeg 2.4 and 3.3.3, the read_data function in libavformat/hls.c does not restrict reload attempts for an insufficient list, which allows remote attackers to cause a denial of service (infinite loop).\n\n * CVE-2017-14059: In FFmpeg 3.3.3, a DoS in cine_read_header() due to lack of an EOF check might cause huge CPU and memory consumption. When a crafted CINE file, which claims a large \"duration\" field in the header but does not contain sufficient backing data, is provided, the image-offset parsing loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14169: In the mxf_read_primer_pack function in libavformat/mxfdec.c in FFmpeg 3.3.3 -\u003e 2.4, an integer signedness error might occur when a crafted file, which claims a large \"item_num\" field such as 0xffffffff, is provided. As a result, the variable \"item_num\" turns negative, bypassing the check for a large value.\n\n * CVE-2017-14170: In libavformat/mxfdec.c in FFmpeg 3.3.3 -\u003e 2.4, a DoS in mxf_read_index_entry_array() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted MXF file, which claims a large \"nb_index_entries\" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU resources, since there is no EOF check inside the loop. Moreover, this big loop can be invoked multiple times if there is more than one applicable data segment in the crafted MXF file.\n\n * CVE-2017-14171: In libavformat/nsvdec.c in FFmpeg 2.4 and 3.3.3, a DoS in nsv_parse_NSVf_header() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted NSV file, which claims a large \"table_entries_used\" field in the header but does not contain sufficient backing data, is provided, the loop over 'table_entries_used' would consume huge CPU resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14222: In libavformat/mov.c in FFmpeg 3.3.3, a DoS in read_tfra() due to lack of an EOF (End of File) check might cause huge CPU and memory consumption. When a crafted MOV file, which claims a large \"item_count\" field in the header but does not contain sufficient backing data, is provided, the loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14223: In libavformat/asfdec_f.c in FFmpeg 3.3.3, a DoS in asf_build_simple_index() due to lack of an EOF (End of File) check might cause huge CPU consumption. When a crafted ASF file, which claims a large \"ict\" field in the header but does not contain sufficient backing data, is provided, the for loop would consume huge CPU and memory resources, since there is no EOF check inside the loop.\n\n * CVE-2017-14225: The av_color_primaries_name function in libavutil/pixdesc.c in FFmpeg 3.3.3 may return a NULL pointer depending on a value contained in a file, but callers do not anticipate this, as demonstrated by the avcodec_string function in libavcodec/utils.c, leading to a NULL pointer dereference. (It is also conceivable that there is security relevance for a NULL pointer dereference in av_color_primaries_name calls within the ffprobe command-line program.)\n\n * CVE-2017-14767: The sdp_parse_fmtp_config_h264 function in libavformat/rtpdec_h264.c in FFmpeg before 3.3.4 mishandles empty sprop-parameter-sets values, which allows remote attackers to cause a denial of service (heap buffer overflow) or possibly have unspecified other impact via a crafted sdp file.",
|
|
"Advisory": {
|
|
"From": "errata.altlinux.org",
|
|
"Severity": "High",
|
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|
"Issued": {
|
|
"Date": "2017-09-18"
|
|
},
|
|
"Updated": {
|
|
"Date": "2017-09-18"
|
|
},
|
|
"BDUs": [
|
|
{
|
|
"ID": "BDU:2017-02085",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02085",
|
|
"Impact": "High",
|
|
"Public": "20170709"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02086",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02086",
|
|
"Impact": "High",
|
|
"Public": "20170907"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02089",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02089",
|
|
"Impact": "High",
|
|
"Public": "20160825"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02090",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02090",
|
|
"Impact": "High",
|
|
"Public": "20160825"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02091",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02091",
|
|
"Impact": "High",
|
|
"Public": "20160825"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02092",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02092",
|
|
"Impact": "High",
|
|
"Public": "20160825"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02093",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02093",
|
|
"Impact": "High",
|
|
"Public": "20160825"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02297",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02297",
|
|
"Impact": "Low",
|
|
"Public": "20170905"
|
|
},
|
|
{
|
|
"ID": "BDU:2017-02298",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-399",
|
|
"Href": "https://bdu.fstec.ru/vul/2017-02298",
|
|
"Impact": "Low",
|
|
"Public": "20170908"
|
|
}
|
|
],
|
|
"CVEs": [
|
|
{
|
|
"ID": "CVE-2017-14054",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14054",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14055",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14055",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14056",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14056",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14057",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14057",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14058",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-835",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14058",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14059",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14059",
|
|
"Impact": "Low",
|
|
"Public": "20170831"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14169",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-20",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14169",
|
|
"Impact": "High",
|
|
"Public": "20170907"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14170",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14170",
|
|
"Impact": "Low",
|
|
"Public": "20170907"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14171",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14171",
|
|
"Impact": "Low",
|
|
"Public": "20170907"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14222",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-834",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14222",
|
|
"Impact": "Low",
|
|
"Public": "20170909"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14223",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|
"CWE": "CWE-400",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14223",
|
|
"Impact": "Low",
|
|
"Public": "20170909"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14225",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-476",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14225",
|
|
"Impact": "High",
|
|
"Public": "20170909"
|
|
},
|
|
{
|
|
"ID": "CVE-2017-14767",
|
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|
"CWE": "CWE-119",
|
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2017-14767",
|
|
"Impact": "High",
|
|
"Public": "20170927"
|
|
}
|
|
],
|
|
"AffectedCPEs": {
|
|
"CPEs": [
|
|
"cpe:/o:alt:kworkstation:9",
|
|
"cpe:/o:alt:workstation:9",
|
|
"cpe:/o:alt:server:9",
|
|
"cpe:/o:alt:server-v:9",
|
|
"cpe:/o:alt:education:9",
|
|
"cpe:/o:alt:slinux:9",
|
|
"cpe:/o:alt:starterkit:p9",
|
|
"cpe:/o:alt:kworkstation:9.1",
|
|
"cpe:/o:alt:workstation:9.1",
|
|
"cpe:/o:alt:server:9.1",
|
|
"cpe:/o:alt:server-v:9.1",
|
|
"cpe:/o:alt:education:9.1",
|
|
"cpe:/o:alt:slinux:9.1",
|
|
"cpe:/o:alt:starterkit:9.1",
|
|
"cpe:/o:alt:kworkstation:9.2",
|
|
"cpe:/o:alt:workstation:9.2",
|
|
"cpe:/o:alt:server:9.2",
|
|
"cpe:/o:alt:server-v:9.2",
|
|
"cpe:/o:alt:education:9.2",
|
|
"cpe:/o:alt:slinux:9.2",
|
|
"cpe:/o:alt:starterkit:9.2"
|
|
]
|
|
}
|
|
}
|
|
},
|
|
"Criteria": {
|
|
"Operator": "AND",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|
"Comment": "ALT Linux must be installed"
|
|
}
|
|
],
|
|
"Criterias": [
|
|
{
|
|
"Operator": "OR",
|
|
"Criterions": [
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226001",
|
|
"Comment": "ffmpeg is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226002",
|
|
"Comment": "ffmpeg-doc is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226003",
|
|
"Comment": "ffplay is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226004",
|
|
"Comment": "ffplay-doc is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226005",
|
|
"Comment": "ffprobe is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226006",
|
|
"Comment": "ffprobe-doc is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226007",
|
|
"Comment": "ffserver is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226008",
|
|
"Comment": "ffserver-doc is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226009",
|
|
"Comment": "libavcodec-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226010",
|
|
"Comment": "libavcodec-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226011",
|
|
"Comment": "libavcodec57 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226012",
|
|
"Comment": "libavdevice-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226013",
|
|
"Comment": "libavdevice-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226014",
|
|
"Comment": "libavdevice57 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226015",
|
|
"Comment": "libavfilter-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226016",
|
|
"Comment": "libavfilter-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226017",
|
|
"Comment": "libavfilter6 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226018",
|
|
"Comment": "libavformat-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226019",
|
|
"Comment": "libavformat-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226020",
|
|
"Comment": "libavformat57 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226021",
|
|
"Comment": "libavresample-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226022",
|
|
"Comment": "libavresample-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226023",
|
|
"Comment": "libavresample3 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226024",
|
|
"Comment": "libavutil-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226025",
|
|
"Comment": "libavutil-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226026",
|
|
"Comment": "libavutil55 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226027",
|
|
"Comment": "libpostproc-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226028",
|
|
"Comment": "libpostproc-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226029",
|
|
"Comment": "libpostproc54 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226030",
|
|
"Comment": "libswresample-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226031",
|
|
"Comment": "libswresample-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226032",
|
|
"Comment": "libswresample2 is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226033",
|
|
"Comment": "libswscale-devel is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226034",
|
|
"Comment": "libswscale-devel-static is earlier than 2:3.3.4-alt1"
|
|
},
|
|
{
|
|
"TestRef": "oval:org.altlinux.errata:tst:20172226035",
|
|
"Comment": "libswscale4 is earlier than 2:3.3.4-alt1"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
} |