677 lines
31 KiB
JSON
677 lines
31 KiB
JSON
{
|
||
"Definition": [
|
||
{
|
||
"ID": "oval:org.altlinux.errata:def:20221693",
|
||
"Version": "oval:org.altlinux.errata:def:20221693",
|
||
"Class": "patch",
|
||
"Metadata": {
|
||
"Title": "ALT-PU-2022-1693: package `vim` update to version 8.2.4747-alt1",
|
||
"AffectedList": [
|
||
{
|
||
"Family": "unix",
|
||
"Platforms": [
|
||
"ALT Linux branch p11"
|
||
],
|
||
"Products": [
|
||
"ALT Container"
|
||
]
|
||
}
|
||
],
|
||
"References": [
|
||
{
|
||
"RefID": "ALT-PU-2022-1693",
|
||
"RefURL": "https://errata.altlinux.org/ALT-PU-2022-1693",
|
||
"Source": "ALTPU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00982",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00982",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00984",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00984",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00988",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00988",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00992",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00992",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00993",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00993",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-00996",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-00996",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01014",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01014",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01016",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01016",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01026",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01026",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01055",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01055",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-01466",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-01466",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02131",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02131",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02375",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02375",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-02385",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-02385",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-03909",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-03909",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05925",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05925",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05977",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05977",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05978",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05978",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-05979",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-05979",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "BDU:2022-07168",
|
||
"RefURL": "https://bdu.fstec.ru/vul/2022-07168",
|
||
"Source": "BDU"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0318",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0359",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0361",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0368",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0392",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0393",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0407",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0408",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0413",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0417",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0443",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0554",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0572",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0629",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0685",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0696",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0714",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0729",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-0943",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1154",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
||
"Source": "CVE"
|
||
},
|
||
{
|
||
"RefID": "CVE-2022-1160",
|
||
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
||
"Source": "CVE"
|
||
}
|
||
],
|
||
"Description": "This update upgrades vim to version 8.2.4747-alt1. \nSecurity Fix(es):\n\n * BDU:2022-00982: Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00984: Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00988: Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00992: Уязвимость функции getexmodeline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00993: Уязвимость функции yank_copy_line текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера\n\n * BDU:2022-00996: Уязвимость функции win_lbr_chartabsize() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01014: Уязвимость функции ex_retab() (indent.c) текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01016: Уязвимость компонента src/ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01026: Уязвимость компонента ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-01055: Уязвимость текстового редактора Vim, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании\n\n * BDU:2022-01466: Уязвимость текстового редактора vim, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02131: Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02375: Уязвимость текстового редактора vim, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2022-02385: Уязвимость текстового редактора vim, связанная с записью за границами буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации\n\n * BDU:2022-03909: Уязвимость функции get_one_sourceline() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код\n\n * BDU:2022-05925: Уязвимость компонента src/undo.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05977: Уязвимость функции ex_retab компонента src/indent.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05978: Уязвимость функции enter_buffer() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-05979: Уязвимость функции unix_expandpath() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * BDU:2022-07168: Уязвимость функции enter_buffer текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании\n\n * CVE-2022-0318: Heap-based Buffer Overflow in vim/vim prior to 8.2.\n\n * CVE-2022-0359: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0361: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0368: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0392: Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.\n\n * CVE-2022-0393: Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0407: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0408: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0413: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0417: Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0443: Use After Free in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0554: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0572: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0629: Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.\n\n * CVE-2022-0685: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.\n\n * CVE-2022-0696: NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.\n\n * CVE-2022-0714: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.\n\n * CVE-2022-0729: Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.\n\n * CVE-2022-0943: Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.\n\n * CVE-2022-1154: Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.\n\n * CVE-2022-1160: heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.",
|
||
"Advisory": {
|
||
"From": "errata.altlinux.org",
|
||
"Severity": "Critical",
|
||
"Rights": "Copyright 2024 BaseALT Ltd.",
|
||
"Issued": {
|
||
"Date": "2022-04-14"
|
||
},
|
||
"Updated": {
|
||
"Date": "2022-04-14"
|
||
},
|
||
"BDUs": [
|
||
{
|
||
"ID": "BDU:2022-00982",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00982",
|
||
"Impact": "Critical",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00984",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00984",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00988",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00988",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00992",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00992",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00993",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00993",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-00996",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-00996",
|
||
"Impact": "High",
|
||
"Public": "20210221"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01014",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01014",
|
||
"Impact": "High",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01016",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01016",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01026",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01026",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01055",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01055",
|
||
"Impact": "Low",
|
||
"Public": "20220222"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-01466",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-01466",
|
||
"Impact": "High",
|
||
"Public": "20220313"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02131",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02131",
|
||
"Impact": "High",
|
||
"Public": "20220329"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02375",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-119",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02375",
|
||
"Impact": "High",
|
||
"Public": "20220223"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-02385",
|
||
"CVSS": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-02385",
|
||
"Impact": "High",
|
||
"Public": "20220217"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-03909",
|
||
"CVSS": "AV:L/AC:L/Au:S/C:C/I:P/A:P",
|
||
"CVSS3": "AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:L",
|
||
"CWE": "CWE-122, CWE-787",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-03909",
|
||
"Impact": "High",
|
||
"Public": "20220328"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05925",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-125",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05925",
|
||
"Impact": "High",
|
||
"Public": "20220124"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05977",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05977",
|
||
"Impact": "High",
|
||
"Public": "20220129"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05978",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05978",
|
||
"Impact": "High",
|
||
"Public": "20220208"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-05979",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-05979",
|
||
"Impact": "High",
|
||
"Public": "20220219"
|
||
},
|
||
{
|
||
"ID": "BDU:2022-07168",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
|
||
"CVSS3": "AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-416",
|
||
"Href": "https://bdu.fstec.ru/vul/2022-07168",
|
||
"Impact": "High",
|
||
"Public": "20220131"
|
||
}
|
||
],
|
||
"CVEs": [
|
||
{
|
||
"ID": "CVE-2022-0318",
|
||
"CVSS": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0318",
|
||
"Impact": "Critical",
|
||
"Public": "20220121"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0359",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0359",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0361",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0361",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0368",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0368",
|
||
"Impact": "High",
|
||
"Public": "20220126"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0392",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0392",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0393",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0393",
|
||
"Impact": "High",
|
||
"Public": "20220128"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0407",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0407",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0408",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0408",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0413",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0413",
|
||
"Impact": "High",
|
||
"Public": "20220130"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0417",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0417",
|
||
"Impact": "High",
|
||
"Public": "20220201"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0443",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0443",
|
||
"Impact": "High",
|
||
"Public": "20220202"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0554",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0554",
|
||
"Impact": "High",
|
||
"Public": "20220210"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0572",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-787",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0572",
|
||
"Impact": "High",
|
||
"Public": "20220214"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0629",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-121",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0629",
|
||
"Impact": "High",
|
||
"Public": "20220217"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0685",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0685",
|
||
"Impact": "High",
|
||
"Public": "20220220"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0696",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-476",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0696",
|
||
"Impact": "Low",
|
||
"Public": "20220221"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0714",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0714",
|
||
"Impact": "Low",
|
||
"Public": "20220222"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0729",
|
||
"CVSS": "AV:N/AC:L/Au:S/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-823",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0729",
|
||
"Impact": "High",
|
||
"Public": "20220223"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-0943",
|
||
"CVSS": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
|
||
"CWE": "CWE-122",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-0943",
|
||
"Impact": "High",
|
||
"Public": "20220314"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1154",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1154",
|
||
"Impact": "High",
|
||
"Public": "20220330"
|
||
},
|
||
{
|
||
"ID": "CVE-2022-1160",
|
||
"CVSS": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
|
||
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
|
||
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2022-1160",
|
||
"Impact": "High",
|
||
"Public": "20220330"
|
||
}
|
||
],
|
||
"AffectedCPEs": {
|
||
"CPEs": [
|
||
"cpe:/o:alt:container:11"
|
||
]
|
||
}
|
||
}
|
||
},
|
||
"Criteria": {
|
||
"Operator": "AND",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:3001",
|
||
"Comment": "ALT Linux must be installed"
|
||
}
|
||
],
|
||
"Criterias": [
|
||
{
|
||
"Operator": "OR",
|
||
"Criterions": [
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693001",
|
||
"Comment": "rpm-build-vim is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693002",
|
||
"Comment": "vim-X11 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693003",
|
||
"Comment": "vim-X11-gnome2 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693004",
|
||
"Comment": "vim-X11-gtk2 is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693005",
|
||
"Comment": "vim-X11-neXtaw is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693006",
|
||
"Comment": "vim-common is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693007",
|
||
"Comment": "vim-console is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693008",
|
||
"Comment": "vim-enhanced is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693009",
|
||
"Comment": "vim-minimal is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693010",
|
||
"Comment": "vim-spell-source is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693011",
|
||
"Comment": "vimtutor is earlier than 4:8.2.4747-alt1"
|
||
},
|
||
{
|
||
"TestRef": "oval:org.altlinux.errata:tst:20221693012",
|
||
"Comment": "xxd is earlier than 4:8.2.4747-alt1"
|
||
}
|
||
]
|
||
}
|
||
]
|
||
}
|
||
}
|
||
]
|
||
} |