1305 lines
61 KiB
JSON
1305 lines
61 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20221711",
|
||
"Version": "oval:org.altlinux.errata:def:20221711",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2022-1711: package `vim` update to version 8.2.4747-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch c9f2"
|
||
],
|
||
"Products": [
|
||
"ALT SPWorkstation",
|
||
"ALT SPServer"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2022-1711",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1711",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05417",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05417",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-05633",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-05633",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06187",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06187",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06188",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06188",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2021-06189",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2021-06189",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00978",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00978",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00979",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00979",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00980",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00980",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00981",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00981",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00982",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00982",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00984",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00984",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00988",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00988",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00989",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00989",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00990",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00990",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00991",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00991",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00992",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00992",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00993",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00993",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00996",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00996",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01014",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01014",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01016",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01016",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01026",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01026",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01055",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01055",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02131",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02131",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02375",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02375",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02385",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02385",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03909",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03909",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05500",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05500",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05501",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05501",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05921",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05921",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05922",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05922",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05924",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05924",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05925",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05925",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05970",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05970",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05977",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05977",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05978",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05978",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05979",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05979",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07168",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07168",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07169",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07169",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2023-00288",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2023-00288",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3770",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3778",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3796",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3872",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3875",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3903",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3927",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3928",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3973",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3974",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-3984",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4019",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4069",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4136",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4166",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4173",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4187",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4192",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2021-4193",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0128",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0156",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0158",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0261",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0359",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0361",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0368",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0392",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0393",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0407",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0408",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0413",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0417",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0554",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0572",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0629",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0685",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0729",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0943",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1154",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1160",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades vim to version 8.2.4747-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05417: Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05633: Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06187: Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2021-06188: Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи\n\n * BDU:2021-06189: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00978: Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00979: Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации\n\n * BDU:2022-00980: Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации\n\n * BDU:2022-00981: Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00982: Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00984: Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00988: Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00989: Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2022-00990: Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00991: Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00992: Уязвимость функции getexmodeline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00993: Уязвимость функции yank_copy_line текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00996: Уязвимость функции win_lbr_chartabsize() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01014: Уязвимость функции ex_retab() (indent.c) текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01016: Уязвимость компонента src/ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01026: Уязвимость компонента ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01055: Уязвимость текстового редактора Vim, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01466: Уязвимость текстового редактора vim, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02131: Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02375: Уязвимость текстового редактора vim, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02385: Уязвимость текстового редактора vim, связанная с записью за границами буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации\n\n * BDU:2022-03909: Уязвимость функции get_one_sourceline() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-05500: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05501: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05921: Уязвимость функции spell_iswordp() компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05922: Уязвимость компонента findfile.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05924: Уязвимость компонента regexp_nfa.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05925: Уязвимость компонента src/undo.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05970: Уязвимость функции getvcol компонента src/charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-05977: Уязвимость функции ex_retab компонента src/indent.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05978: Уязвимость функции enter_buffer() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05979: Уязвимость функции unix_expandpath() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07168: Уязвимость функции enter_buffer текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07169: Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2023-00288: Уязвимость текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-3770: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3778: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3796: vim is vulnerable to Use After Free\n\n * CVE-2021-3872: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3875: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3903: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3927: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3928: vim is vulnerable to Use of Uninitialized Variable\n\n * CVE-2021-3973: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3974: vim is vulnerable to Use After Free\n\n * CVE-2021-3984: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4019: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4069: vim is vulnerable to Use After Free\n\n * CVE-2021-4136: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4166: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2021-4173: vim is vulnerable to Use After Free\n\n * CVE-2021-4187: vim is vulnerable to Use After Free\n\n * CVE-2021-4192: vim is vulnerable to Use After Free\n\n * CVE-2021-4193: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2022-0128: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2022-0156: vim is vulnerable to Use After Free\n\n * CVE-2022-0158: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2022-0261: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0318: Heap-based Buffer Overflow in vim/vim prior to 8.2.\n\n * CVE-2022-0359: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0361: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0368: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0392: Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.\n\n * CVE-2022-0393: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0407: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0408: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0413: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0417: Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0443: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0554: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0572: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0629: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0685: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.\n\n * CVE-2022-0696: NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.\n\n * CVE-2022-0714: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.\n\n * CVE-2022-0729: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.\n\n * CVE-2022-0943: Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.\n\n * CVE-2022-1154: Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.\n\n * CVE-2022-1160: heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.\n\n * #35865: syntax/spec.vim не подсвечивает длинные CVE\n\n * #37754: Добавить подсветку тега vcs",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2022-04-18"
|
||
},
|
||
"Updated": {
|
||
"Date": "2022-04-18"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2021-05417",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
||
"CWE": "CWE-122, CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05417",
|
||
"Impact": "High",
|
||
"Public": "20210911"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-05633",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-05633",
|
||
"Impact": "High",
|
||
"Public": "20210907"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06187",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06187",
|
||
"Impact": "High",
|
||
"Public": "20211121"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06188",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06188",
|
||
"Impact": "Low",
|
||
"Public": "20211121"
|
||
},
|
||
{
|
||
"ID": "BDU:2021-06189",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2021-06189",
|
||
"Impact": "Low",
|
||
"Public": "20211121"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00978",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00978",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00979",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00979",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00980",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00980",
|
||
"Impact": "High",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00981",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00981",
|
||
"Impact": "High",
|
||
"Public": "20211227"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00982",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00982",
|
||
"Impact": "Critical",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00984",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00984",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00988",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00988",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00989",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00989",
|
||
"Impact": "High",
|
||
"Public": "20211206"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00990",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00990",
|
||
"Impact": "High",
|
||
"Public": "20220118"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00991",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00991",
|
||
"Impact": "High",
|
||
"Public": "20211219"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00992",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00992",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00993",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00993",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00996",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00996",
|
||
"Impact": "High",
|
||
"Public": "20210221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01014",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01014",
|
||
"Impact": "High",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01016",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01016",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01026",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01026",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01055",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01055",
|
||
"Impact": "Low",
|
||
"Public": "20220222"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01466",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01466",
|
||
"Impact": "High",
|
||
"Public": "20220313"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02131",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02131",
|
||
"Impact": "High",
|
||
"Public": "20220329"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02375",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02375",
|
||
"Impact": "High",
|
||
"Public": "20220223"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02385",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02385",
|
||
"Impact": "High",
|
||
"Public": "20220217"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03909",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03909",
|
||
"Impact": "High",
|
||
"Public": "20220328"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05500",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05500",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05501",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05501",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05921",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-457",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05921",
|
||
"Impact": "High",
|
||
"Public": "20211029"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05922",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05922",
|
||
"Impact": "High",
|
||
"Public": "20211113"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05924",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05924",
|
||
"Impact": "High",
|
||
"Public": "20211025"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05925",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05925",
|
||
"Impact": "High",
|
||
"Public": "20220124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05970",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05970",
|
||
"Impact": "Low",
|
||
"Public": "20211229"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05977",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05977",
|
||
"Impact": "High",
|
||
"Public": "20220129"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05978",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05978",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05979",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05979",
|
||
"Impact": "High",
|
||
"Public": "20220219"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07168",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07168",
|
||
"Impact": "High",
|
||
"Public": "20220131"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07169",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07169",
|
||
"Impact": "High",
|
||
"Public": "20211223"
|
||
},
|
||
{
|
||
"ID": "BDU:2023-00288",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2023-00288",
|
||
"Impact": "High",
|
||
"Public": "20210903"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2021-3770",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
|
||
"Impact": "High",
|
||
"Public": "20210906"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3778",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
|
||
"Impact": "High",
|
||
"Public": "20210915"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3796",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
|
||
"Impact": "High",
|
||
"Public": "20210915"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3872",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
|
||
"Impact": "High",
|
||
"Public": "20211019"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3875",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
|
||
"Impact": "Low",
|
||
"Public": "20211015"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3903",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
|
||
"Impact": "High",
|
||
"Public": "20211027"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3927",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
|
||
"Impact": "High",
|
||
"Public": "20211105"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3928",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-457",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
|
||
"Impact": "High",
|
||
"Public": "20211105"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3973",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
|
||
"Impact": "High",
|
||
"Public": "20211119"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3974",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
|
||
"Impact": "High",
|
||
"Public": "20211119"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-3984",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4019",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
|
||
"Impact": "High",
|
||
"Public": "20211201"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4069",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
|
||
"Impact": "High",
|
||
"Public": "20211206"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4136",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
|
||
"Impact": "High",
|
||
"Public": "20211219"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4166",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
|
||
"Impact": "High",
|
||
"Public": "20211225"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4173",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
|
||
"Impact": "High",
|
||
"Public": "20211227"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4187",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
|
||
"Impact": "High",
|
||
"Public": "20211229"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4192",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
|
||
"Impact": "High",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "CVE-2021-4193",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
|
||
"Impact": "Low",
|
||
"Public": "20211231"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0128",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
|
||
"Impact": "High",
|
||
"Public": "20220106"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0156",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0158",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
|
||
"Impact": "Low",
|
||
"Public": "20220110"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0261",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
|
||
"Impact": "High",
|
||
"Public": "20220118"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0318",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
||
"Impact": "Critical",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0359",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0361",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0368",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0392",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0393",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0407",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0408",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0413",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0417",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
||
"Impact": "High",
|
||
"Public": "20220201"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0443",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
||
"Impact": "High",
|
||
"Public": "20220202"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0554",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
||
"Impact": "High",
|
||
"Public": "20220210"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0572",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
||
"Impact": "High",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0629",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
||
"Impact": "High",
|
||
"Public": "20220217"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0685",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
||
"Impact": "High",
|
||
"Public": "20220220"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0714",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
||
"Impact": "Low",
|
||
"Public": "20220222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0729",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
||
"Impact": "High",
|
||
"Public": "20220223"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0943",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
||
"Impact": "High",
|
||
"Public": "20220314"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1154",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
||
"Impact": "High",
|
||
"Public": "20220330"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1160",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
||
"Impact": "High",
|
||
"Public": "20220330"
|
||
}
|
||
],
|
||
"Bugzilla": [
|
||
{
|
||
"ID": "35865",
|
||
"Href": "https://bugzilla.altlinux.org/35865",
|
||
"Data": "syntax/spec.vim не подсвечивает длинные CVE"
|
||
},
|
||
{
|
||
"ID": "37754",
|
||
"Href": "https://bugzilla.altlinux.org/37754",
|
||
"Data": "Добавить подсветку тега vcs"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:spworkstation:8.4",
|
||
"cpe:/o:alt:spserver:8.4"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711001",
|
||
"Comment": "rpm-build-vim is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711002",
|
||
"Comment": "vim-X11 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711003",
|
||
"Comment": "vim-X11-gnome2 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711004",
|
||
"Comment": "vim-X11-gtk2 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711005",
|
||
"Comment": "vim-X11-neXtaw is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711006",
|
||
"Comment": "vim-common is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711007",
|
||
"Comment": "vim-console is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711008",
|
||
"Comment": "vim-enhanced is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711009",
|
||
"Comment": "vim-minimal is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711010",
|
||
"Comment": "vim-spell-source is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711011",
|
||
"Comment": "vimtutor is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221711012",
|
||
"Comment": "xxd is earlier than 4:8.2.4747-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |