2024-04-16 14:26:14 +00:00

506 lines
25 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20193262",
"Version": "oval:org.altlinux.errata:def:20193262",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2019-3262: package `SDL2` update to version 2.0.10-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p9"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit"
]
}
],
"References": [
{
"RefID": "ALT-PU-2019-3262",
"RefURL": "https://errata.altlinux.org/ALT-PU-2019-3262",
"Source": "ALTPU"
},
{
"RefID": "BDU:2019-01623",
"RefURL": "https://bdu.fstec.ru/vul/2019-01623",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04698",
"RefURL": "https://bdu.fstec.ru/vul/2020-04698",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04699",
"RefURL": "https://bdu.fstec.ru/vul/2020-04699",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04700",
"RefURL": "https://bdu.fstec.ru/vul/2020-04700",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04701",
"RefURL": "https://bdu.fstec.ru/vul/2020-04701",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04702",
"RefURL": "https://bdu.fstec.ru/vul/2020-04702",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04703",
"RefURL": "https://bdu.fstec.ru/vul/2020-04703",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04704",
"RefURL": "https://bdu.fstec.ru/vul/2020-04704",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04717",
"RefURL": "https://bdu.fstec.ru/vul/2020-04717",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04718",
"RefURL": "https://bdu.fstec.ru/vul/2020-04718",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04719",
"RefURL": "https://bdu.fstec.ru/vul/2020-04719",
"Source": "BDU"
},
{
"RefID": "BDU:2020-04720",
"RefURL": "https://bdu.fstec.ru/vul/2020-04720",
"Source": "BDU"
},
{
"RefID": "BDU:2021-03748",
"RefURL": "https://bdu.fstec.ru/vul/2021-03748",
"Source": "BDU"
},
{
"RefID": "BDU:2023-02638",
"RefURL": "https://bdu.fstec.ru/vul/2023-02638",
"Source": "BDU"
},
{
"RefID": "CVE-2019-12222",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-12222",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13616",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13616",
"Source": "CVE"
},
{
"RefID": "CVE-2019-13626",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-13626",
"Source": "CVE"
},
{
"RefID": "CVE-2019-14906",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-14906",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7572",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7573",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7573",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7574",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7574",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7575",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7575",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7576",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7576",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7577",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7577",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7578",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7578",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7635",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7635",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7636",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7636",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7637",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7637",
"Source": "CVE"
},
{
"RefID": "CVE-2019-7638",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2019-7638",
"Source": "CVE"
}
],
"Description": "This update upgrades SDL2 to version 2.0.10-alt1. \nSecurity Fix(es):\n\n * BDU:2019-01623: Уязвимость функции wNumCoef мультимедийной библиотеки SDL, связанная с чтением за границами буфера данных, позволяющая нарушителю получить несанкционированный доступ к информации\n\n * BDU:2020-04698: Уязвимость функции IMA_ADPCM_nibble библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04699: Уязвимость функции InitMS_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04700: Уязвимость функции IMA_ADPCM_decode библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04701: Уязвимость функции MS_ADPCM_decode библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04702: Уязвимость функции InitMS_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04703: Уязвимость функции SDL_LoadWAV_RW библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04704: Уязвимость функции InitIMA_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04717: Уязвимость функции Blit1to4 библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04718: Уязвимость функции SDL_GetRGB библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04719: Уязвимость функции SDL_FillRect библиотеки Simple DirectMedia Layer , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2020-04720: Уязвимость функции Map1toN библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2021-03748: Уязвимость функция BlitNtoN (video/SDL_blit_N.c) мультимедийной библиотеки Simple DirectMedia Layer, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2023-02638: Уязвимость функции IMA_ADPCM_decode() компонента audio/SDL_wave.c мультимедийной библиотеки Simple DirectMedia Layer, позволяющая нарушителю вызвать отказ в обслуживании\n\n * CVE-2019-12222: An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9. There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixels.c.\n\n * CVE-2019-13616: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.\n\n * CVE-2019-13626: SDL (Simple DirectMedia Layer) 2.x through 2.0.9 has a heap-based buffer over-read in Fill_IMA_ADPCM_block, caused by an integer overflow in IMA_ADPCM_decode() in audio/SDL_wave.c.\n\n * CVE-2019-14906: A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.\n\n * CVE-2019-7572: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.\n\n * CVE-2019-7573: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).\n\n * CVE-2019-7574: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.\n\n * CVE-2019-7575: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.\n\n * CVE-2019-7576: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).\n\n * CVE-2019-7577: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.\n\n * CVE-2019-7578: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.\n\n * CVE-2019-7635: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.\n\n * CVE-2019-7636: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.\n\n * CVE-2019-7637: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.\n\n * CVE-2019-7638: SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2019-12-11"
},
"Updated": {
"Date": "2019-12-11"
},
"BDUs": [
{
"ID": "BDU:2019-01623",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2019-01623",
"Impact": "High",
"Public": "20190205"
},
{
"ID": "BDU:2020-04698",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04698",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2020-04699",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04699",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2020-04700",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04700",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2020-04701",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-04701",
"Impact": "High",
"Public": "20190314"
},
{
"ID": "BDU:2020-04702",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04702",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2020-04703",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04703",
"Impact": "High",
"Public": "20190314"
},
{
"ID": "BDU:2020-04704",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04704",
"Impact": "High",
"Public": "20190314"
},
{
"ID": "BDU:2020-04717",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04717",
"Impact": "Low",
"Public": "20190314"
},
{
"ID": "BDU:2020-04718",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04718",
"Impact": "High",
"Public": "20190314"
},
{
"ID": "BDU:2020-04719",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2020-04719",
"Impact": "Low",
"Public": "20190207"
},
{
"ID": "BDU:2020-04720",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2020-04720",
"Impact": "High",
"Public": "20190314"
},
{
"ID": "BDU:2021-03748",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-03748",
"Impact": "High",
"Public": "20190922"
},
{
"ID": "BDU:2023-02638",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2023-02638",
"Impact": "Low",
"Public": "20190225"
}
],
"CVEs": [
{
"ID": "CVE-2019-12222",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-12222",
"Impact": "Low",
"Public": "20190520"
},
{
"ID": "CVE-2019-13616",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13616",
"Impact": "High",
"Public": "20190716"
},
{
"ID": "CVE-2019-13626",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-13626",
"Impact": "Low",
"Public": "20190717"
},
{
"ID": "CVE-2019-14906",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-14906",
"Impact": "Critical",
"Public": "20200107"
},
{
"ID": "CVE-2019-7572",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7572",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7573",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7573",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7574",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7574",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7575",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7575",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7576",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7576",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7577",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7577",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7578",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7578",
"Impact": "High",
"Public": "20190207"
},
{
"ID": "CVE-2019-7635",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7635",
"Impact": "High",
"Public": "20190208"
},
{
"ID": "CVE-2019-7636",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7636",
"Impact": "High",
"Public": "20190208"
},
{
"ID": "CVE-2019-7637",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7637",
"Impact": "High",
"Public": "20190208"
},
{
"ID": "CVE-2019-7638",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2019-7638",
"Impact": "High",
"Public": "20190208"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:9",
"cpe:/o:alt:workstation:9",
"cpe:/o:alt:server:9",
"cpe:/o:alt:server-v:9",
"cpe:/o:alt:education:9",
"cpe:/o:alt:slinux:9",
"cpe:/o:alt:starterkit:p9",
"cpe:/o:alt:kworkstation:9.1",
"cpe:/o:alt:workstation:9.1",
"cpe:/o:alt:server:9.1",
"cpe:/o:alt:server-v:9.1",
"cpe:/o:alt:education:9.1",
"cpe:/o:alt:slinux:9.1",
"cpe:/o:alt:starterkit:9.1",
"cpe:/o:alt:kworkstation:9.2",
"cpe:/o:alt:workstation:9.2",
"cpe:/o:alt:server:9.2",
"cpe:/o:alt:server-v:9.2",
"cpe:/o:alt:education:9.2",
"cpe:/o:alt:slinux:9.2",
"cpe:/o:alt:starterkit:9.2"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:1001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20193262001",
"Comment": "libSDL2 is earlier than 0:2.0.10-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20193262002",
"Comment": "libSDL2-devel is earlier than 0:2.0.10-alt1"
}
]
}
]
}
}
]
}