2024-04-16 14:26:14 +00:00

1305 lines
61 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20221711",
"Version": "oval:org.altlinux.errata:def:20221711",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-1711: package `vim` update to version 8.2.4747-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-1711",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1711",
"Source": "ALTPU"
},
{
"RefID": "BDU:2021-05417",
"RefURL": "https://bdu.fstec.ru/vul/2021-05417",
"Source": "BDU"
},
{
"RefID": "BDU:2021-05633",
"RefURL": "https://bdu.fstec.ru/vul/2021-05633",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06187",
"RefURL": "https://bdu.fstec.ru/vul/2021-06187",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06188",
"RefURL": "https://bdu.fstec.ru/vul/2021-06188",
"Source": "BDU"
},
{
"RefID": "BDU:2021-06189",
"RefURL": "https://bdu.fstec.ru/vul/2021-06189",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00978",
"RefURL": "https://bdu.fstec.ru/vul/2022-00978",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00979",
"RefURL": "https://bdu.fstec.ru/vul/2022-00979",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00980",
"RefURL": "https://bdu.fstec.ru/vul/2022-00980",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00981",
"RefURL": "https://bdu.fstec.ru/vul/2022-00981",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00982",
"RefURL": "https://bdu.fstec.ru/vul/2022-00982",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00984",
"RefURL": "https://bdu.fstec.ru/vul/2022-00984",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00988",
"RefURL": "https://bdu.fstec.ru/vul/2022-00988",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00989",
"RefURL": "https://bdu.fstec.ru/vul/2022-00989",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00990",
"RefURL": "https://bdu.fstec.ru/vul/2022-00990",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00991",
"RefURL": "https://bdu.fstec.ru/vul/2022-00991",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00992",
"RefURL": "https://bdu.fstec.ru/vul/2022-00992",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00993",
"RefURL": "https://bdu.fstec.ru/vul/2022-00993",
"Source": "BDU"
},
{
"RefID": "BDU:2022-00996",
"RefURL": "https://bdu.fstec.ru/vul/2022-00996",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01014",
"RefURL": "https://bdu.fstec.ru/vul/2022-01014",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01016",
"RefURL": "https://bdu.fstec.ru/vul/2022-01016",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01026",
"RefURL": "https://bdu.fstec.ru/vul/2022-01026",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01055",
"RefURL": "https://bdu.fstec.ru/vul/2022-01055",
"Source": "BDU"
},
{
"RefID": "BDU:2022-01466",
"RefURL": "https://bdu.fstec.ru/vul/2022-01466",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02131",
"RefURL": "https://bdu.fstec.ru/vul/2022-02131",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02375",
"RefURL": "https://bdu.fstec.ru/vul/2022-02375",
"Source": "BDU"
},
{
"RefID": "BDU:2022-02385",
"RefURL": "https://bdu.fstec.ru/vul/2022-02385",
"Source": "BDU"
},
{
"RefID": "BDU:2022-03909",
"RefURL": "https://bdu.fstec.ru/vul/2022-03909",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05500",
"RefURL": "https://bdu.fstec.ru/vul/2022-05500",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05501",
"RefURL": "https://bdu.fstec.ru/vul/2022-05501",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05921",
"RefURL": "https://bdu.fstec.ru/vul/2022-05921",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05922",
"RefURL": "https://bdu.fstec.ru/vul/2022-05922",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05924",
"RefURL": "https://bdu.fstec.ru/vul/2022-05924",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05925",
"RefURL": "https://bdu.fstec.ru/vul/2022-05925",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05970",
"RefURL": "https://bdu.fstec.ru/vul/2022-05970",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05977",
"RefURL": "https://bdu.fstec.ru/vul/2022-05977",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05978",
"RefURL": "https://bdu.fstec.ru/vul/2022-05978",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05979",
"RefURL": "https://bdu.fstec.ru/vul/2022-05979",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07168",
"RefURL": "https://bdu.fstec.ru/vul/2022-07168",
"Source": "BDU"
},
{
"RefID": "BDU:2022-07169",
"RefURL": "https://bdu.fstec.ru/vul/2022-07169",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00288",
"RefURL": "https://bdu.fstec.ru/vul/2023-00288",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3770",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3778",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3796",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3872",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3875",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3903",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3927",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3928",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3973",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3974",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
"Source": "CVE"
},
{
"RefID": "CVE-2021-3984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4019",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4069",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4136",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4166",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4173",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4187",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4192",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4193",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0128",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0156",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0158",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0261",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0318",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0359",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0361",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0368",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0392",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0393",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0407",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0408",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0413",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0417",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0443",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0554",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0572",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0629",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0685",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0696",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0714",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0729",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
"Source": "CVE"
},
{
"RefID": "CVE-2022-0943",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1154",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1160",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
"Source": "CVE"
}
],
"Description": "This update upgrades vim to version 8.2.4747-alt1. \nSecurity Fix(es):\n\n * BDU:2021-05417: Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-05633: Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании\n\n * BDU:2021-06187: Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды\n\n * BDU:2021-06188: Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи\n\n * BDU:2021-06189: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00978: Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00979: Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации\n\n * BDU:2022-00980: Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации\n\n * BDU:2022-00981: Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-00982: Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00984: Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00988: Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00989: Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации\n\n * BDU:2022-00990: Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00991: Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00992: Уязвимость функции getexmodeline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00993: Уязвимость функции yank_copy_line текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00996: Уязвимость функции win_lbr_chartabsize() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01014: Уязвимость функции ex_retab() (indent.c) текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01016: Уязвимость компонента src/ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01026: Уязвимость компонента ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01055: Уязвимость текстового редактора Vim, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01466: Уязвимость текстового редактора vim, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02131: Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02375: Уязвимость текстового редактора vim, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02385: Уязвимость текстового редактора vim, связанная с записью за границами буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации\n\n * BDU:2022-03909: Уязвимость функции get_one_sourceline() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-05500: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05501: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05921: Уязвимость функции spell_iswordp() компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05922: Уязвимость компонента findfile.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05924: Уязвимость компонента regexp_nfa.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05925: Уязвимость компонента src/undo.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05970: Уязвимость функции getvcol компонента src/charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным\n\n * BDU:2022-05977: Уязвимость функции ex_retab компонента src/indent.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05978: Уязвимость функции enter_buffer() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05979: Уязвимость функции unix_expandpath() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07168: Уязвимость функции enter_buffer текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07169: Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании\n\n * BDU:2023-00288: Уязвимость текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2021-3770: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3778: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3796: vim is vulnerable to Use After Free\n\n * CVE-2021-3872: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3875: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3903: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3927: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3928: vim is vulnerable to Use of Uninitialized Variable\n\n * CVE-2021-3973: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-3974: vim is vulnerable to Use After Free\n\n * CVE-2021-3984: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4019: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4069: vim is vulnerable to Use After Free\n\n * CVE-2021-4136: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4166: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2021-4173: vim is vulnerable to Use After Free\n\n * CVE-2021-4187: vim is vulnerable to Use After Free\n\n * CVE-2021-4192: vim is vulnerable to Use After Free\n\n * CVE-2021-4193: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2022-0128: vim is vulnerable to Out-of-bounds Read\n\n * CVE-2022-0156: vim is vulnerable to Use After Free\n\n * CVE-2022-0158: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2022-0261: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0318: Heap-based Buffer Overflow in vim/vim prior to 8.2.\n\n * CVE-2022-0359: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0361: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0368: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0392: Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.\n\n * CVE-2022-0393: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0407: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0408: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0413: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0417: Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0443: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0554: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0572: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0629: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0685: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.\n\n * CVE-2022-0696: NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.\n\n * CVE-2022-0714: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.\n\n * CVE-2022-0729: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.\n\n * CVE-2022-0943: Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.\n\n * CVE-2022-1154: Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.\n\n * CVE-2022-1160: heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.\n\n * #35865: syntax/spec.vim не подсвечивает длинные CVE\n\n * #37754: Добавить подсветку тега vcs",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "Critical",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-04-18"
},
"Updated": {
"Date": "2022-04-18"
},
"BDUs": [
{
"ID": "BDU:2021-05417",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"CWE": "CWE-122, CWE-416",
"Href": "https://bdu.fstec.ru/vul/2021-05417",
"Impact": "High",
"Public": "20210911"
},
{
"ID": "BDU:2021-05633",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-05633",
"Impact": "High",
"Public": "20210907"
},
{
"ID": "BDU:2021-06187",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2021-06187",
"Impact": "High",
"Public": "20211121"
},
{
"ID": "BDU:2021-06188",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2021-06188",
"Impact": "Low",
"Public": "20211121"
},
{
"ID": "BDU:2021-06189",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2021-06189",
"Impact": "Low",
"Public": "20211121"
},
{
"ID": "BDU:2022-00978",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00978",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2022-00979",
"CVSS": "AV:L/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00979",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "BDU:2022-00980",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00980",
"Impact": "High",
"Public": "20211231"
},
{
"ID": "BDU:2022-00981",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00981",
"Impact": "High",
"Public": "20211227"
},
{
"ID": "BDU:2022-00982",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00982",
"Impact": "Critical",
"Public": "20220121"
},
{
"ID": "BDU:2022-00984",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00984",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-00988",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00988",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "BDU:2022-00989",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-00989",
"Impact": "High",
"Public": "20211206"
},
{
"ID": "BDU:2022-00990",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00990",
"Impact": "High",
"Public": "20220118"
},
{
"ID": "BDU:2022-00991",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-00991",
"Impact": "High",
"Public": "20211219"
},
{
"ID": "BDU:2022-00992",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00992",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "BDU:2022-00993",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-00993",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-00996",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-00996",
"Impact": "High",
"Public": "20210221"
},
{
"ID": "BDU:2022-01014",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01014",
"Impact": "High",
"Public": "20220214"
},
{
"ID": "BDU:2022-01016",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-01016",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "BDU:2022-01026",
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01026",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "BDU:2022-01055",
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-01055",
"Impact": "Low",
"Public": "20220222"
},
{
"ID": "BDU:2022-01466",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-01466",
"Impact": "High",
"Public": "20220313"
},
{
"ID": "BDU:2022-02131",
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-02131",
"Impact": "High",
"Public": "20220329"
},
{
"ID": "BDU:2022-02375",
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-119",
"Href": "https://bdu.fstec.ru/vul/2022-02375",
"Impact": "High",
"Public": "20220223"
},
{
"ID": "BDU:2022-02385",
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-02385",
"Impact": "High",
"Public": "20220217"
},
{
"ID": "BDU:2022-03909",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
"CWE": "CWE-122, CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-03909",
"Impact": "High",
"Public": "20220328"
},
{
"ID": "BDU:2022-05500",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05500",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05501",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05501",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05921",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-457",
"Href": "https://bdu.fstec.ru/vul/2022-05921",
"Impact": "High",
"Public": "20211029"
},
{
"ID": "BDU:2022-05922",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05922",
"Impact": "High",
"Public": "20211113"
},
{
"ID": "BDU:2022-05924",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05924",
"Impact": "High",
"Public": "20211025"
},
{
"ID": "BDU:2022-05925",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05925",
"Impact": "High",
"Public": "20220124"
},
{
"ID": "BDU:2022-05970",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05970",
"Impact": "Low",
"Public": "20211229"
},
{
"ID": "BDU:2022-05977",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05977",
"Impact": "High",
"Public": "20220129"
},
{
"ID": "BDU:2022-05978",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://bdu.fstec.ru/vul/2022-05978",
"Impact": "High",
"Public": "20220208"
},
{
"ID": "BDU:2022-05979",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://bdu.fstec.ru/vul/2022-05979",
"Impact": "High",
"Public": "20220219"
},
{
"ID": "BDU:2022-07168",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-07168",
"Impact": "High",
"Public": "20220131"
},
{
"ID": "BDU:2022-07169",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:N/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-07169",
"Impact": "High",
"Public": "20211223"
},
{
"ID": "BDU:2023-00288",
"CVSS": "AV:L/AC:L/Au:S/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-00288",
"Impact": "High",
"Public": "20210903"
}
],
"CVEs": [
{
"ID": "CVE-2021-3770",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3770",
"Impact": "High",
"Public": "20210906"
},
{
"ID": "CVE-2021-3778",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3778",
"Impact": "High",
"Public": "20210915"
},
{
"ID": "CVE-2021-3796",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3796",
"Impact": "High",
"Public": "20210915"
},
{
"ID": "CVE-2021-3872",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3872",
"Impact": "High",
"Public": "20211019"
},
{
"ID": "CVE-2021-3875",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3875",
"Impact": "Low",
"Public": "20211015"
},
{
"ID": "CVE-2021-3903",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3903",
"Impact": "High",
"Public": "20211027"
},
{
"ID": "CVE-2021-3927",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3927",
"Impact": "High",
"Public": "20211105"
},
{
"ID": "CVE-2021-3928",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-457",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3928",
"Impact": "High",
"Public": "20211105"
},
{
"ID": "CVE-2021-3973",
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3973",
"Impact": "High",
"Public": "20211119"
},
{
"ID": "CVE-2021-3974",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3974",
"Impact": "High",
"Public": "20211119"
},
{
"ID": "CVE-2021-3984",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2021-4019",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2021-4069",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4069",
"Impact": "High",
"Public": "20211206"
},
{
"ID": "CVE-2021-4136",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4136",
"Impact": "High",
"Public": "20211219"
},
{
"ID": "CVE-2021-4166",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4166",
"Impact": "High",
"Public": "20211225"
},
{
"ID": "CVE-2021-4173",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4173",
"Impact": "High",
"Public": "20211227"
},
{
"ID": "CVE-2021-4187",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4187",
"Impact": "High",
"Public": "20211229"
},
{
"ID": "CVE-2021-4192",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4192",
"Impact": "High",
"Public": "20211231"
},
{
"ID": "CVE-2021-4193",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4193",
"Impact": "Low",
"Public": "20211231"
},
{
"ID": "CVE-2022-0128",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0128",
"Impact": "High",
"Public": "20220106"
},
{
"ID": "CVE-2022-0156",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0156",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "CVE-2022-0158",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:N",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0158",
"Impact": "Low",
"Public": "20220110"
},
{
"ID": "CVE-2022-0261",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0261",
"Impact": "High",
"Public": "20220118"
},
{
"ID": "CVE-2022-0318",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
"Impact": "Critical",
"Public": "20220121"
},
{
"ID": "CVE-2022-0359",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0361",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0368",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
"Impact": "High",
"Public": "20220126"
},
{
"ID": "CVE-2022-0392",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "CVE-2022-0393",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
"Impact": "High",
"Public": "20220128"
},
{
"ID": "CVE-2022-0407",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0408",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0413",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
"Impact": "High",
"Public": "20220130"
},
{
"ID": "CVE-2022-0417",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
"Impact": "High",
"Public": "20220201"
},
{
"ID": "CVE-2022-0443",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
"Impact": "High",
"Public": "20220202"
},
{
"ID": "CVE-2022-0554",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
"Impact": "High",
"Public": "20220210"
},
{
"ID": "CVE-2022-0572",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
"Impact": "High",
"Public": "20220214"
},
{
"ID": "CVE-2022-0629",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-121",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
"Impact": "High",
"Public": "20220217"
},
{
"ID": "CVE-2022-0685",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
"Impact": "High",
"Public": "20220220"
},
{
"ID": "CVE-2022-0696",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
"Impact": "Low",
"Public": "20220221"
},
{
"ID": "CVE-2022-0714",
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
"Impact": "Low",
"Public": "20220222"
},
{
"ID": "CVE-2022-0729",
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-823",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
"Impact": "High",
"Public": "20220223"
},
{
"ID": "CVE-2022-0943",
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
"Impact": "High",
"Public": "20220314"
},
{
"ID": "CVE-2022-1154",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
"Impact": "High",
"Public": "20220330"
},
{
"ID": "CVE-2022-1160",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
"Impact": "High",
"Public": "20220330"
}
],
"Bugzilla": [
{
"ID": "35865",
"Href": "https://bugzilla.altlinux.org/35865",
"Data": "syntax/spec.vim не подсвечивает длинные CVE"
},
{
"ID": "37754",
"Href": "https://bugzilla.altlinux.org/37754",
"Data": "Добавить подсветку тега vcs"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20221711001",
"Comment": "rpm-build-vim is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711002",
"Comment": "vim-X11 is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711003",
"Comment": "vim-X11-gnome2 is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711004",
"Comment": "vim-X11-gtk2 is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711005",
"Comment": "vim-X11-neXtaw is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711006",
"Comment": "vim-common is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711007",
"Comment": "vim-console is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711008",
"Comment": "vim-enhanced is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711009",
"Comment": "vim-minimal is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711010",
"Comment": "vim-spell-source is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711011",
"Comment": "vimtutor is earlier than 4:8.2.4747-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20221711012",
"Comment": "xxd is earlier than 4:8.2.4747-alt1"
}
]
}
]
}
}
]
}