{ "Definition": [ { "ID": "oval:org.altlinux.errata:def:20222430", "Version": "oval:org.altlinux.errata:def:20222430", "Class": "patch", "Metadata": { "Title": "ALT-PU-2022-2430: package `vim` update to version 8.2.5172-alt1", "AffectedList": [ { "Family": "unix", "Platforms": [ "ALT Linux branch p9" ], "Products": [ "ALT Server", "ALT Virtualization Server", "ALT Workstation", "ALT Workstation K", "ALT Education", "Simply Linux", "Starterkit" ] } ], "References": [ { "RefID": "ALT-PU-2022-2430", "RefURL": "https://errata.altlinux.org/ALT-PU-2022-2430", "Source": "ALTPU" }, { "RefID": "BDU:2022-04025", "RefURL": "https://bdu.fstec.ru/vul/2022-04025", "Source": "BDU" }, { "RefID": "BDU:2022-04208", "RefURL": "https://bdu.fstec.ru/vul/2022-04208", "Source": "BDU" }, { "RefID": "BDU:2022-04209", "RefURL": "https://bdu.fstec.ru/vul/2022-04209", "Source": "BDU" }, { "RefID": "BDU:2022-04214", "RefURL": "https://bdu.fstec.ru/vul/2022-04214", "Source": "BDU" }, { "RefID": "BDU:2022-04215", "RefURL": "https://bdu.fstec.ru/vul/2022-04215", "Source": "BDU" }, { "RefID": "BDU:2022-04216", "RefURL": "https://bdu.fstec.ru/vul/2022-04216", "Source": "BDU" }, { "RefID": "BDU:2022-04219", "RefURL": "https://bdu.fstec.ru/vul/2022-04219", "Source": "BDU" }, { "RefID": "BDU:2022-04220", "RefURL": "https://bdu.fstec.ru/vul/2022-04220", "Source": "BDU" }, { "RefID": "BDU:2022-04221", "RefURL": "https://bdu.fstec.ru/vul/2022-04221", "Source": "BDU" }, { "RefID": "BDU:2022-04222", "RefURL": "https://bdu.fstec.ru/vul/2022-04222", "Source": "BDU" }, { "RefID": "BDU:2022-04223", "RefURL": "https://bdu.fstec.ru/vul/2022-04223", "Source": "BDU" }, { "RefID": "BDU:2022-04224", "RefURL": "https://bdu.fstec.ru/vul/2022-04224", "Source": "BDU" }, { "RefID": "BDU:2022-04225", "RefURL": "https://bdu.fstec.ru/vul/2022-04225", "Source": "BDU" }, { "RefID": "BDU:2022-04226", "RefURL": "https://bdu.fstec.ru/vul/2022-04226", "Source": "BDU" }, { "RefID": "BDU:2022-04572", "RefURL": "https://bdu.fstec.ru/vul/2022-04572", "Source": "BDU" }, { "RefID": "BDU:2022-05523", "RefURL": "https://bdu.fstec.ru/vul/2022-05523", "Source": "BDU" }, { "RefID": "BDU:2022-05981", "RefURL": "https://bdu.fstec.ru/vul/2022-05981", "Source": "BDU" }, { "RefID": "BDU:2022-06480", "RefURL": "https://bdu.fstec.ru/vul/2022-06480", "Source": "BDU" }, { "RefID": "CVE-2022-1898", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1898", "Source": "CVE" }, { "RefID": "CVE-2022-1927", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", "Source": "CVE" }, { "RefID": "CVE-2022-1942", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1942", "Source": "CVE" }, { "RefID": "CVE-2022-1968", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1968", "Source": "CVE" }, { "RefID": "CVE-2022-2000", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2000", "Source": "CVE" }, { "RefID": "CVE-2022-2042", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2042", "Source": "CVE" }, { "RefID": "CVE-2022-2124", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2124", "Source": "CVE" }, { "RefID": "CVE-2022-2125", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2125", "Source": "CVE" }, { "RefID": "CVE-2022-2126", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2126", "Source": "CVE" }, { "RefID": "CVE-2022-2129", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2129", "Source": "CVE" }, { "RefID": "CVE-2022-2175", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2175", "Source": "CVE" }, { "RefID": "CVE-2022-2182", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2182", "Source": "CVE" }, { "RefID": "CVE-2022-2183", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2183", "Source": "CVE" }, { "RefID": "CVE-2022-2206", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2206", "Source": "CVE" }, { "RefID": "CVE-2022-2207", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2207", "Source": "CVE" }, { "RefID": "CVE-2022-2208", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2208", "Source": "CVE" }, { "RefID": "CVE-2022-2210", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2210", "Source": "CVE" }, { "RefID": "CVE-2022-2231", "RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2231", "Source": "CVE" } ], "Description": "This update upgrades vim to version 8.2.5172-alt1. \nSecurity Fix(es):\n\n * BDU:2022-04025: Уязвимость функции skipwhite текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04208: Уязвимость функции skipwhite() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04209: Уязвимость компонента diff.c текстового редактора Vim, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)\n\n * BDU:2022-04214: Уязвимость функции ins_bs() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2022-04215: Уязвимость функции get_lisp_indent() текстового редактора Vim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации\n\n * BDU:2022-04216: Уязвимость функции parse_cmd_address() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04219: Уязвимость функции ml_append_int() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04220: Уязвимость функции suggest_trie_walk() текстового редактора Vim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или оказать другое воздействие\n\n * BDU:2022-04221: Уязвимость функции get_lisp_indent() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04222: Уязвимость функции current_quote() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04223: Уязвимость функции append_command() (ex_docmd.c) текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04224: Уязвимость компонента search.c текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04225: Уязвимость функции vim_regsub_both() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-04226: Уязвимость функции cmdline_insert_reg() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации\n\n * BDU:2022-04572: Уязвимость компонента edit.c текстового редактора Vim, позволяющая нарушителю выполнить произвольный код в целевой системе\n\n * BDU:2022-05523: Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05981: Уязвимость функции find_pattern_in_path текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-06480: Уязвимость функции vim_regsub_both компонента regexp.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2022-1898: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-1927: Buffer Over-read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-1942: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-1968: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2000: Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2042: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2124: Buffer Over-read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2125: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2126: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2129: Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2175: Buffer Over-read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2182: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2183: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2206: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2207: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2208: NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.\n\n * CVE-2022-2210: Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2231: NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.", "Advisory": { "From": "errata.altlinux.org", "Severity": "High", "Rights": "Copyright 2024 BaseALT Ltd.", "Issued": { "Date": "2022-08-15" }, "Updated": { "Date": "2022-08-15" }, "BDUs": [ { "ID": "BDU:2022-04025", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-476", "Href": "https://bdu.fstec.ru/vul/2022-04025", "Impact": "High", "Public": "20220628" }, { "ID": "BDU:2022-04208", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2022-04208", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04209", "CVSS": "AV:N/AC:H/Au:N/C:N/I:N/A:P", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "CWE": "CWE-476", "Href": "https://bdu.fstec.ru/vul/2022-04209", "Impact": "Low", "Public": "20220627" }, { "ID": "BDU:2022-04214", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://bdu.fstec.ru/vul/2022-04214", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04215", "CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2022-04215", "Impact": "Low", "Public": "20220627" }, { "ID": "BDU:2022-04216", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://bdu.fstec.ru/vul/2022-04216", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04219", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://bdu.fstec.ru/vul/2022-04219", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04220", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2022-04220", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04221", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://bdu.fstec.ru/vul/2022-04221", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04222", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2022-04222", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04223", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://bdu.fstec.ru/vul/2022-04223", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04224", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2022-04224", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04225", "CVSS": "AV:N/AC:H/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://bdu.fstec.ru/vul/2022-04225", "Impact": "High", "Public": "20220627" }, { "ID": "BDU:2022-04226", "CVSS": "AV:N/AC:H/Au:N/C:P/I:N/A:N", "CVSS3": "AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:N/A:N", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2022-04226", "Impact": "Low", "Public": "20220627" }, { "ID": "BDU:2022-04572", "CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://bdu.fstec.ru/vul/2022-04572", "Impact": "High", "Public": "20220626" }, { "ID": "BDU:2022-05523", "CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2022-05523", "Impact": "High", "Public": "20220529" }, { "ID": "BDU:2022-05981", "CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://bdu.fstec.ru/vul/2022-05981", "Impact": "High", "Public": "20220525" }, { "ID": "BDU:2022-06480", "CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://bdu.fstec.ru/vul/2022-06480", "Impact": "High", "Public": "20220616" } ], "CVEs": [ { "ID": "CVE-2022-1898", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1898", "Impact": "High", "Public": "20220527" }, { "ID": "CVE-2022-1927", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-126", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1927", "Impact": "High", "Public": "20220529" }, { "ID": "CVE-2022-1942", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1942", "Impact": "High", "Public": "20220531" }, { "ID": "CVE-2022-1968", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1968", "Impact": "High", "Public": "20220602" }, { "ID": "CVE-2022-2000", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2000", "Impact": "High", "Public": "20220609" }, { "ID": "CVE-2022-2042", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-416", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2042", "Impact": "High", "Public": "20220610" }, { "ID": "CVE-2022-2124", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-126", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2124", "Impact": "High", "Public": "20220619" }, { "ID": "CVE-2022-2125", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2125", "Impact": "High", "Public": "20220619" }, { "ID": "CVE-2022-2126", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2126", "Impact": "High", "Public": "20220619" }, { "ID": "CVE-2022-2129", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2129", "Impact": "High", "Public": "20220619" }, { "ID": "CVE-2022-2175", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2175", "Impact": "High", "Public": "20220623" }, { "ID": "CVE-2022-2182", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2182", "Impact": "High", "Public": "20220623" }, { "ID": "CVE-2022-2183", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2183", "Impact": "High", "Public": "20220623" }, { "ID": "CVE-2022-2206", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-125", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2206", "Impact": "High", "Public": "20220626" }, { "ID": "CVE-2022-2207", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-122", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2207", "Impact": "High", "Public": "20220627" }, { "ID": "CVE-2022-2208", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2208", "Impact": "Low", "Public": "20220627" }, { "ID": "CVE-2022-2210", "CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "CWE": "CWE-787", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2210", "Impact": "High", "Public": "20220627" }, { "ID": "CVE-2022-2231", "CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "CWE": "CWE-476", "Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2231", "Impact": "Low", "Public": "20220628" } ], "AffectedCPEs": { "CPEs": [ "cpe:/o:alt:kworkstation:9", "cpe:/o:alt:workstation:9", "cpe:/o:alt:server:9", "cpe:/o:alt:server-v:9", "cpe:/o:alt:education:9", "cpe:/o:alt:slinux:9", "cpe:/o:alt:starterkit:p9", "cpe:/o:alt:kworkstation:9.1", "cpe:/o:alt:workstation:9.1", "cpe:/o:alt:server:9.1", "cpe:/o:alt:server-v:9.1", "cpe:/o:alt:education:9.1", "cpe:/o:alt:slinux:9.1", "cpe:/o:alt:starterkit:9.1", "cpe:/o:alt:kworkstation:9.2", "cpe:/o:alt:workstation:9.2", "cpe:/o:alt:server:9.2", "cpe:/o:alt:server-v:9.2", "cpe:/o:alt:education:9.2", "cpe:/o:alt:slinux:9.2", "cpe:/o:alt:starterkit:9.2" ] } } }, "Criteria": { "Operator": "AND", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:1001", "Comment": "ALT Linux must be installed" } ], "Criterias": [ { "Operator": "OR", "Criterions": [ { "TestRef": "oval:org.altlinux.errata:tst:20222430001", "Comment": "rpm-build-vim is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430002", "Comment": "vim-X11 is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430003", "Comment": "vim-X11-gnome2 is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430004", "Comment": "vim-X11-gtk2 is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430005", "Comment": "vim-X11-gtk3 is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430006", "Comment": "vim-common is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430007", "Comment": "vim-console is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430008", "Comment": "vim-enhanced is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430009", "Comment": "vim-minimal is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430010", "Comment": "vim-spell-source is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430011", "Comment": "vimtutor is earlier than 4:8.2.5172-alt1" }, { "TestRef": "oval:org.altlinux.errata:tst:20222430012", "Comment": "xxd is earlier than 4:8.2.5172-alt1" } ] } ] } } ] }