2024-04-16 14:26:14 +00:00

673 lines
32 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20222704",
"Version": "oval:org.altlinux.errata:def:20222704",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2022-2704: package `vim` update to version 9.0.0463-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch c9f2"
],
"Products": [
"ALT SPWorkstation",
"ALT SPServer"
]
}
],
"References": [
{
"RefID": "ALT-PU-2022-2704",
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-2704",
"Source": "ALTPU"
},
{
"RefID": "BDU:2022-05081",
"RefURL": "https://bdu.fstec.ru/vul/2022-05081",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05082",
"RefURL": "https://bdu.fstec.ru/vul/2022-05082",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05093",
"RefURL": "https://bdu.fstec.ru/vul/2022-05093",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05096",
"RefURL": "https://bdu.fstec.ru/vul/2022-05096",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05097",
"RefURL": "https://bdu.fstec.ru/vul/2022-05097",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05098",
"RefURL": "https://bdu.fstec.ru/vul/2022-05098",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05145",
"RefURL": "https://bdu.fstec.ru/vul/2022-05145",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05146",
"RefURL": "https://bdu.fstec.ru/vul/2022-05146",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05289",
"RefURL": "https://bdu.fstec.ru/vul/2022-05289",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05331",
"RefURL": "https://bdu.fstec.ru/vul/2022-05331",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05389",
"RefURL": "https://bdu.fstec.ru/vul/2022-05389",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05390",
"RefURL": "https://bdu.fstec.ru/vul/2022-05390",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05500",
"RefURL": "https://bdu.fstec.ru/vul/2022-05500",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05501",
"RefURL": "https://bdu.fstec.ru/vul/2022-05501",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05509",
"RefURL": "https://bdu.fstec.ru/vul/2022-05509",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05523",
"RefURL": "https://bdu.fstec.ru/vul/2022-05523",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05551",
"RefURL": "https://bdu.fstec.ru/vul/2022-05551",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05597",
"RefURL": "https://bdu.fstec.ru/vul/2022-05597",
"Source": "BDU"
},
{
"RefID": "BDU:2022-05659",
"RefURL": "https://bdu.fstec.ru/vul/2022-05659",
"Source": "BDU"
},
{
"RefID": "BDU:2023-00450",
"RefURL": "https://bdu.fstec.ru/vul/2023-00450",
"Source": "BDU"
},
{
"RefID": "CVE-2021-3984",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Source": "CVE"
},
{
"RefID": "CVE-2021-4019",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Source": "CVE"
},
{
"RefID": "CVE-2022-1927",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1927",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2816",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2816",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2817",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2817",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2819",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2819",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2845",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2845",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2849",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2849",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2862",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2862",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2874",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2874",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2889",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2889",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2923",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2923",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2946",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2946",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2980",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2980",
"Source": "CVE"
},
{
"RefID": "CVE-2022-2982",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-2982",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3016",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3016",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3037",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3037",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3099",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3099",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3134",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3134",
"Source": "CVE"
},
{
"RefID": "CVE-2022-3153",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-3153",
"Source": "CVE"
},
{
"RefID": "CVE-2022-47024",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-47024",
"Source": "CVE"
}
],
"Description": "This update upgrades vim to version 9.0.0463-alt1. \nSecurity Fix(es):\n\n * BDU:2022-05081: Уязвимость функции string_quote() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05082: Уязвимость функции check_vim9_unlet() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05093: Уязвимость функции utf_head_off() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05096: Уязвимость функции compile_lock_unlock() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05097: Уязвимость функции latin_ptr2len() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05098: Уязвимость функции generate_PCALL() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05145: Уязвимость функции generate_loadvar() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05146: Уязвимость функции find_var_also_in_script() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05289: Уязвимость функции vim_vsnprintf_typval() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05331: Уязвимость функции get_next_valid_entry() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05389: Уязвимость функции qf_buf_add_line() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05390: Уязвимость функции qf_fill_buffer() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05500: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05501: Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05509: Уязвимость функции do_cmdline() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05523: Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05551: Уязвимость функции do_tag() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05597: Уязвимость функции vim_regcomp() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2022-05659: Уязвимость функции do_mouse() текстового редактора Vim, позволяющая нарушителю оказать воздействие на доступность защищаемой информации\n\n * BDU:2023-00450: Уязвимость функции gui_x11_create_blank_mouse() (gui_x11.c) текстового редактора Vim, связанная с переполнением буфера, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS) или оказать другое воздействие\n\n * CVE-2021-3984: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2021-4019: vim is vulnerable to Heap-based Buffer Overflow\n\n * CVE-2022-1927: Buffer Over-read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-2816: Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.\n\n * CVE-2022-2817: Use After Free in GitHub repository vim/vim prior to 9.0.0213.\n\n * CVE-2022-2819: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.\n\n * CVE-2022-2845: Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.\n\n\n\n * CVE-2022-2849: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.\n\n * CVE-2022-2862: Use After Free in GitHub repository vim/vim prior to 9.0.0221.\n\n * CVE-2022-2874: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.\n\n * CVE-2022-2889: Use After Free in GitHub repository vim/vim prior to 9.0.0225.\n\n * CVE-2022-2923: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.\n\n * CVE-2022-2946: Use After Free in GitHub repository vim/vim prior to 9.0.0246.\n\n * CVE-2022-2980: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0259.\n\n * CVE-2022-2982: Use After Free in GitHub repository vim/vim prior to 9.0.0260.\n\n * CVE-2022-3016: Use After Free in GitHub repository vim/vim prior to 9.0.0286.\n\n * CVE-2022-3037: Use After Free in GitHub repository vim/vim prior to 9.0.0322.\n\n * CVE-2022-3099: Use After Free in GitHub repository vim/vim prior to 9.0.0360.\n\n * CVE-2022-3134: Use After Free in GitHub repository vim/vim prior to 9.0.0389.\n\n * CVE-2022-3153: NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0404.\n\n * CVE-2022-47024: A null pointer dereference issue was discovered in function gui_x11_create_blank_mouse in gui_x11.c in vim 8.1.2269 thru 9.0.0339 allows attackers to cause denial of service or other unspecified impacts.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2022-10-02"
},
"Updated": {
"Date": "2022-10-02"
},
"BDUs": [
{
"ID": "BDU:2022-05081",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05081",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "BDU:2022-05082",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://bdu.fstec.ru/vul/2022-05082",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "BDU:2022-05093",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-126",
"Href": "https://bdu.fstec.ru/vul/2022-05093",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2022-05096",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05096",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "BDU:2022-05097",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2022-05097",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2022-05098",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05098",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2022-05145",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05145",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2022-05146",
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:C",
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05146",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "BDU:2022-05289",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05289",
"Impact": "High",
"Public": "20220823"
},
{
"ID": "BDU:2022-05331",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05331",
"Impact": "High",
"Public": "20220828"
},
{
"ID": "BDU:2022-05389",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05389",
"Impact": "High",
"Public": "20220830"
},
{
"ID": "BDU:2022-05390",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05390",
"Impact": "High",
"Public": "20220825"
},
{
"ID": "BDU:2022-05500",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05500",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05501",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2022-05501",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "BDU:2022-05509",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05509",
"Impact": "High",
"Public": "20220901"
},
{
"ID": "BDU:2022-05523",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05523",
"Impact": "High",
"Public": "20220529"
},
{
"ID": "BDU:2022-05551",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2022-05551",
"Impact": "High",
"Public": "20220903"
},
{
"ID": "BDU:2022-05597",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05597",
"Impact": "High",
"Public": "20220905"
},
{
"ID": "BDU:2022-05659",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2022-05659",
"Impact": "High",
"Public": "20220823"
},
{
"ID": "BDU:2023-00450",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://bdu.fstec.ru/vul/2023-00450",
"Impact": "High",
"Public": "20230127"
}
],
"CVEs": [
{
"ID": "CVE-2021-3984",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-3984",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2021-4019",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2021-4019",
"Impact": "High",
"Public": "20211201"
},
{
"ID": "CVE-2022-1927",
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-126",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1927",
"Impact": "High",
"Public": "20220529"
},
{
"ID": "CVE-2022-2816",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-125",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2816",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "CVE-2022-2817",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2817",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "CVE-2022-2819",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2819",
"Impact": "High",
"Public": "20220815"
},
{
"ID": "CVE-2022-2845",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-1284",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2845",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "CVE-2022-2849",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2849",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "CVE-2022-2862",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2862",
"Impact": "High",
"Public": "20220817"
},
{
"ID": "CVE-2022-2874",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2874",
"Impact": "Low",
"Public": "20220818"
},
{
"ID": "CVE-2022-2889",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2889",
"Impact": "High",
"Public": "20220819"
},
{
"ID": "CVE-2022-2923",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2923",
"Impact": "Low",
"Public": "20220822"
},
{
"ID": "CVE-2022-2946",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2946",
"Impact": "High",
"Public": "20220823"
},
{
"ID": "CVE-2022-2980",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2980",
"Impact": "Low",
"Public": "20220825"
},
{
"ID": "CVE-2022-2982",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-2982",
"Impact": "High",
"Public": "20220825"
},
{
"ID": "CVE-2022-3016",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3016",
"Impact": "High",
"Public": "20220828"
},
{
"ID": "CVE-2022-3037",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3037",
"Impact": "High",
"Public": "20220830"
},
{
"ID": "CVE-2022-3099",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3099",
"Impact": "High",
"Public": "20220903"
},
{
"ID": "CVE-2022-3134",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3134",
"Impact": "High",
"Public": "20220906"
},
{
"ID": "CVE-2022-3153",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-3153",
"Impact": "Low",
"Public": "20220908"
},
{
"ID": "CVE-2022-47024",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"CWE": "CWE-476",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-47024",
"Impact": "High",
"Public": "20230120"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:spworkstation:8.4",
"cpe:/o:alt:spserver:8.4"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:3001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20222704001",
"Comment": "rpm-build-vim is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704002",
"Comment": "vim-X11 is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704003",
"Comment": "vim-X11-gnome2 is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704004",
"Comment": "vim-X11-gtk2 is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704005",
"Comment": "vim-X11-gtk3 is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704006",
"Comment": "vim-common is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704007",
"Comment": "vim-console is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704008",
"Comment": "vim-enhanced is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704009",
"Comment": "vim-minimal is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704010",
"Comment": "vim-spell-source is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704011",
"Comment": "vimtutor is earlier than 4:9.0.0463-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20222704012",
"Comment": "xxd is earlier than 4:9.0.0463-alt1"
}
]
}
]
}
}
]
}