1385 lines
65 KiB
JSON
1385 lines
65 KiB
JSON
|
{
|
|||
|
"Definition": [
|
|||
|
{
|
|||
|
"ID": "oval:org.altlinux.errata:def:20221771",
|
|||
|
"Version": "oval:org.altlinux.errata:def:20221771",
|
|||
|
"Class": "patch",
|
|||
|
"Metadata": {
|
|||
|
"Title": "ALT-PU-2022-1771: package `vim` update to version 8.2.4784-alt1",
|
|||
|
"AffectedList": [
|
|||
|
{
|
|||
|
"Family": "unix",
|
|||
|
"Platforms": [
|
|||
|
"ALT Linux branch p9"
|
|||
|
],
|
|||
|
"Products": [
|
|||
|
"ALT Server",
|
|||
|
"ALT Virtualization Server",
|
|||
|
"ALT Workstation",
|
|||
|
"ALT Workstation K",
|
|||
|
"ALT Education",
|
|||
|
"Simply Linux",
|
|||
|
"Starterkit"
|
|||
|
]
|
|||
|
}
|
|||
|
],
|
|||
|
"References": [
|
|||
|
{
|
|||
|
"RefID": "ALT-PU-2022-1771",
|
|||
|
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1771",
|
|||
|
"Source": "ALTPU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2021-05417",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2021-05417",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2021-05633",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2021-05633",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2021-06187",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2021-06187",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2021-06188",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2021-06188",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2021-06189",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2021-06189",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00978",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00978",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00979",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00979",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00980",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00980",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00981",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00981",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00982",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00982",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00984",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00984",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00988",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00988",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00989",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00989",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00990",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00990",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00991",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00991",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00992",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00992",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00993",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00993",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-00996",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-00996",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-01014",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-01014",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-01016",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-01016",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-01026",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-01026",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-01055",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-01055",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-01466",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-01466",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-02131",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-02131",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-02375",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-02375",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-02385",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-02385",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-03269",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-03269",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-03270",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-03270",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-03909",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-03909",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05500",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05500",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05501",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05501",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05921",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05921",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05922",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05922",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05924",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05924",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05925",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05925",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05970",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05970",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05977",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05977",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05978",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05978",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-05979",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-05979",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-07168",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-07168",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2022-07169",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2022-07169",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "BDU:2023-00288",
|
|||
|
"RefURL": "https://bdu.fstec.ru/vul/2023-00288",
|
|||
|
"Source": "BDU"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3770",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3778",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3796",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3872",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3875",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3903",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3927",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3928",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3973",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3974",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-3984",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4019",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4069",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4136",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4166",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4173",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4187",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4192",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2021-4193",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0128",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0156",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0158",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0261",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0318",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0359",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0361",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0368",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0392",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0393",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0407",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0408",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0413",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0417",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0443",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0554",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0572",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0629",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0685",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0696",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0714",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0729",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-0943",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-1154",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-1160",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-1381",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1381",
|
|||
|
"Source": "CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"RefID": "CVE-2022-1420",
|
|||
|
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
|
|||
|
"Source": "CVE"
|
|||
|
}
|
|||
|
],
|
|||
|
"Description": "This update upgrades vim to version 8.2.4784-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05417: Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05633: Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06187: Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2021-06188: Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи\n\n * BDU:2021-06189: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00978: Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00979: Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации\n\n * BDU:2022-00980: Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации\n\n * BDU:2022-00981: Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00982: Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00984: Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00988: Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00989: Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2022-00990: Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00991: Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызва
|
|||
|
"Advisory": {
|
|||
|
"From": "errata.altlinux.org",
|
|||
|
"Severity": "Critical",
|
|||
|
"Rights": "Copyright 2024 BaseALT Ltd.",
|
|||
|
"Issued": {
|
|||
|
"Date": "2022-04-27"
|
|||
|
},
|
|||
|
"Updated": {
|
|||
|
"Date": "2022-04-27"
|
|||
|
},
|
|||
|
"BDUs": [
|
|||
|
{
|
|||
|
"ID": "BDU:2021-05417",
|
|||
|
"CVSS": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
|||
|
"CWE": "CWE-122, CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2021-05417",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210911"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2021-05633",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122, CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2021-05633",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210907"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2021-06187",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2021-06187",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211121"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2021-06188",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2021-06188",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20211121"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2021-06189",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2021-06189",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20211121"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00978",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00978",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220110"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00979",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00979",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220110"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00980",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00980",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211231"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00981",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00981",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211227"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00982",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00982",
|
|||
|
"Impact": "Critical",
|
|||
|
"Public": "20220121"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00984",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00984",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00988",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00988",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220126"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00989",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00989",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211206"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00990",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00990",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220118"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00991",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00991",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211219"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00992",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00992",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220128"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00993",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00993",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-00996",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-00996",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210221"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-01014",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-01014",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220214"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-01016",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-01016",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-01026",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-01026",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220126"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-01055",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
|||
|
"CWE": "CWE-476",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-01055",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220222"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-01466",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-01466",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220313"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-02131",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-02131",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220329"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-02375",
|
|||
|
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-119",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-02375",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220223"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-02385",
|
|||
|
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-121, CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-02385",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220217"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-03269",
|
|||
|
"CVSS": "AV:L/AC:H/Au:N/C:N/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
|
|||
|
"CWE": "CWE-119, CWE-122, CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-03269",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220413"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-03270",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L",
|
|||
|
"CWE": "CWE-119, CWE-125, CWE-823",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-03270",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220414"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-03909",
|
|||
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
|||
|
"CWE": "CWE-122, CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-03909",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220328"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05500",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05500",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211201"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05501",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05501",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211201"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05921",
|
|||
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-457",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05921",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211029"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05922",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05922",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211113"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05924",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05924",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211025"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05925",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05925",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220124"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05970",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05970",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20211229"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05977",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05977",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220129"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05978",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05978",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220208"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-05979",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-05979",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220219"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-07168",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-07168",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220131"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2022-07169",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
|
|||
|
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2022-07169",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211223"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "BDU:2023-00288",
|
|||
|
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
|||
|
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://bdu.fstec.ru/vul/2023-00288",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210903"
|
|||
|
}
|
|||
|
],
|
|||
|
"CVEs": [
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3770",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210906"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3778",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210915"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3796",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20210915"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3872",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211019"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3875",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20211015"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3903",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211027"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3927",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211105"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3928",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-457",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211105"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3973",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211119"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3974",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211119"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-3984",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211201"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4019",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211201"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4069",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211206"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4136",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211219"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4166",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211225"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4173",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211227"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4187",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211229"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4192",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20211231"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2021-4193",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20211231"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0128",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220106"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0156",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220110"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0158",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220110"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0261",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220118"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0318",
|
|||
|
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
|||
|
"Impact": "Critical",
|
|||
|
"Public": "20220121"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0359",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220126"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0361",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220126"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0368",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220126"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0392",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220128"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0393",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
|||
|
"CWE": "CWE-125",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220128"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0407",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0408",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-121",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0413",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220130"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0417",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220201"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0443",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220202"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0554",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220210"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0572",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-787",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220214"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0629",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-121",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220217"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0685",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220220"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0696",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-476",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220221"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0714",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220222"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0729",
|
|||
|
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220223"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-0943",
|
|||
|
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220314"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-1154",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-416",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220330"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-1160",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220330"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-1381",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
|||
|
"CWE": "CWE-122",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1381",
|
|||
|
"Impact": "High",
|
|||
|
"Public": "20220418"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "CVE-2022-1420",
|
|||
|
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
|||
|
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
|||
|
"CWE": "CWE-823",
|
|||
|
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1420",
|
|||
|
"Impact": "Low",
|
|||
|
"Public": "20220421"
|
|||
|
}
|
|||
|
],
|
|||
|
"Bugzilla": [
|
|||
|
{
|
|||
|
"ID": "35865",
|
|||
|
"Href": "https://bugzilla.altlinux.org/35865",
|
|||
|
"Data": "syntax/spec.vim не подсвечивает длинные CVE"
|
|||
|
},
|
|||
|
{
|
|||
|
"ID": "37754",
|
|||
|
"Href": "https://bugzilla.altlinux.org/37754",
|
|||
|
"Data": "Добавить подсветку тега vcs"
|
|||
|
}
|
|||
|
],
|
|||
|
"AffectedCPEs": {
|
|||
|
"CPEs": [
|
|||
|
"cpe:/o:alt:kworkstation:9",
|
|||
|
"cpe:/o:alt:workstation:9",
|
|||
|
"cpe:/o:alt:server:9",
|
|||
|
"cpe:/o:alt:server-v:9",
|
|||
|
"cpe:/o:alt:education:9",
|
|||
|
"cpe:/o:alt:slinux:9",
|
|||
|
"cpe:/o:alt:starterkit:p9",
|
|||
|
"cpe:/o:alt:kworkstation:9.1",
|
|||
|
"cpe:/o:alt:workstation:9.1",
|
|||
|
"cpe:/o:alt:server:9.1",
|
|||
|
"cpe:/o:alt:server-v:9.1",
|
|||
|
"cpe:/o:alt:education:9.1",
|
|||
|
"cpe:/o:alt:slinux:9.1",
|
|||
|
"cpe:/o:alt:starterkit:9.1",
|
|||
|
"cpe:/o:alt:kworkstation:9.2",
|
|||
|
"cpe:/o:alt:workstation:9.2",
|
|||
|
"cpe:/o:alt:server:9.2",
|
|||
|
"cpe:/o:alt:server-v:9.2",
|
|||
|
"cpe:/o:alt:education:9.2",
|
|||
|
"cpe:/o:alt:slinux:9.2",
|
|||
|
"cpe:/o:alt:starterkit:9.2"
|
|||
|
]
|
|||
|
}
|
|||
|
}
|
|||
|
},
|
|||
|
"Criteria": {
|
|||
|
"Operator": "AND",
|
|||
|
"Criterions": [
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:1001",
|
|||
|
"Comment": "ALT Linux must be installed"
|
|||
|
}
|
|||
|
],
|
|||
|
"Criterias": [
|
|||
|
{
|
|||
|
"Operator": "OR",
|
|||
|
"Criterions": [
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771001",
|
|||
|
"Comment": "rpm-build-vim is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771002",
|
|||
|
"Comment": "vim-X11 is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771003",
|
|||
|
"Comment": "vim-X11-gnome2 is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771004",
|
|||
|
"Comment": "vim-X11-gtk2 is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771005",
|
|||
|
"Comment": "vim-X11-gtk3 is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771006",
|
|||
|
"Comment": "vim-common is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771007",
|
|||
|
"Comment": "vim-console is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771008",
|
|||
|
"Comment": "vim-enhanced is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771009",
|
|||
|
"Comment": "vim-minimal is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771010",
|
|||
|
"Comment": "vim-spell-source is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771011",
|
|||
|
"Comment": "vimtutor is earlier than 4:8.2.4784-alt1"
|
|||
|
},
|
|||
|
{
|
|||
|
"TestRef": "oval:org.altlinux.errata:tst:20221771012",
|
|||
|
"Comment": "xxd is earlier than 4:8.2.4784-alt1"
|
|||
|
}
|
|||
|
]
|
|||
|
}
|
|||
|
]
|
|||
|
}
|
|||
|
}
|
|||
|
]
|
|||
|
}
|