2024-12-12 21:07:30 +00:00

339 lines
14 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

{
"Definition": [
{
"ID": "oval:org.altlinux.errata:def:20235553",
"Version": "oval:org.altlinux.errata:def:20235553",
"Class": "patch",
"Metadata": {
"Title": "ALT-PU-2023-5553: package `vim` update to version 9.0.1893-alt1",
"AffectedList": [
{
"Family": "unix",
"Platforms": [
"ALT Linux branch p10"
],
"Products": [
"ALT Server",
"ALT Virtualization Server",
"ALT Workstation",
"ALT Workstation K",
"ALT Education",
"Simply Linux",
"Starterkit",
"ALT Container"
]
}
],
"References": [
{
"RefID": "ALT-PU-2023-5553",
"RefURL": "https://errata.altlinux.org/ALT-PU-2023-5553",
"Source": "ALTPU"
},
{
"RefID": "BDU:2023-05534",
"RefURL": "https://bdu.fstec.ru/vul/2023-05534",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05667",
"RefURL": "https://bdu.fstec.ru/vul/2023-05667",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05668",
"RefURL": "https://bdu.fstec.ru/vul/2023-05668",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05669",
"RefURL": "https://bdu.fstec.ru/vul/2023-05669",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05670",
"RefURL": "https://bdu.fstec.ru/vul/2023-05670",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05671",
"RefURL": "https://bdu.fstec.ru/vul/2023-05671",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05672",
"RefURL": "https://bdu.fstec.ru/vul/2023-05672",
"Source": "BDU"
},
{
"RefID": "BDU:2023-05673",
"RefURL": "https://bdu.fstec.ru/vul/2023-05673",
"Source": "BDU"
},
{
"RefID": "CVE-2023-4733",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4733",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4734",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4734",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4735",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4735",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4736",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4736",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4738",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4738",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4750",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4750",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4752",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4752",
"Source": "CVE"
},
{
"RefID": "CVE-2023-4781",
"RefURL": "https://nvd.nist.gov/vuln/detail/CVE-2023-4781",
"Source": "CVE"
}
],
"Description": "This update upgrades vim to version 9.0.1893-alt1. \nSecurity Fix(es):\n\n * BDU:2023-05534: Уязвимость функции vim_regsub_both() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации\n\n * BDU:2023-05667: Уязвимость функции bt_quickfix текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05668: Уязвимость функции buflist_altfpos текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05669: Уязвимость функции ins_compl_get_exp текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05670: Уязвимость текстового редактора vim, связанная с использованием ненадёжного пути поиска, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05671: Уязвимость функции f_fullcommand текстового редактора vim , вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05672: Уязвимость текстового редактора vim, связанная с записью за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код\n\n * BDU:2023-05673: Уязвимость функции vim_regsub_both текстового редактора vim, позволяющая нарушителю выполнить произвольный код\n\n * CVE-2023-4733: Use After Free in GitHub repository vim/vim prior to 9.0.1840.\n\n * CVE-2023-4734: Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.\n\n * CVE-2023-4735: Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.\n\n * CVE-2023-4736: Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833.\n\n * CVE-2023-4738: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.\n\n * CVE-2023-4750: Use After Free in GitHub repository vim/vim prior to 9.0.1857.\n\n * CVE-2023-4752: Use After Free in GitHub repository vim/vim prior to 9.0.1858.\n\n * CVE-2023-4781: Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.",
"Advisory": {
"From": "errata.altlinux.org",
"Severity": "High",
"Rights": "Copyright 2024 BaseALT Ltd.",
"Issued": {
"Date": "2023-09-19"
},
"Updated": {
"Date": "2023-09-19"
},
"BDUs": [
{
"ID": "BDU:2023-05534",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2023-05534",
"Impact": "High",
"Public": "20230905"
},
{
"ID": "BDU:2023-05667",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-05667",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "BDU:2023-05668",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-05668",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "BDU:2023-05669",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-416",
"Href": "https://bdu.fstec.ru/vul/2023-05669",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "BDU:2023-05670",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-426",
"Href": "https://bdu.fstec.ru/vul/2023-05670",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "BDU:2023-05671",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-190",
"Href": "https://bdu.fstec.ru/vul/2023-05671",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "BDU:2023-05672",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://bdu.fstec.ru/vul/2023-05672",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "BDU:2023-05673",
"CVSS": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"CVSS3": "AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-122",
"Href": "https://bdu.fstec.ru/vul/2023-05673",
"Impact": "High",
"Public": "20230902"
}
],
"CVEs": [
{
"ID": "CVE-2023-4733",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4733",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "CVE-2023-4734",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4734",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "CVE-2023-4735",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4735",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "CVE-2023-4736",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4736",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "CVE-2023-4738",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"CWE": "CWE-787",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4738",
"Impact": "High",
"Public": "20230902"
},
{
"ID": "CVE-2023-4750",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4750",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "CVE-2023-4752",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4752",
"Impact": "High",
"Public": "20230904"
},
{
"ID": "CVE-2023-4781",
"CVSS3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"Href": "https://nvd.nist.gov/vuln/detail/CVE-2023-4781",
"Impact": "High",
"Public": "20230905"
}
],
"AffectedCPEs": {
"CPEs": [
"cpe:/o:alt:kworkstation:10",
"cpe:/o:alt:workstation:10",
"cpe:/o:alt:server:10",
"cpe:/o:alt:server-v:10",
"cpe:/o:alt:education:10",
"cpe:/o:alt:slinux:10",
"cpe:/o:alt:starterkit:10",
"cpe:/o:alt:starterkit:p10",
"cpe:/o:alt:container:10"
]
}
}
},
"Criteria": {
"Operator": "AND",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:2001",
"Comment": "ALT Linux must be installed"
}
],
"Criterias": [
{
"Operator": "OR",
"Criterions": [
{
"TestRef": "oval:org.altlinux.errata:tst:20235553001",
"Comment": "rpm-build-vim is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553002",
"Comment": "vim-X11 is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553003",
"Comment": "vim-X11-gnome2 is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553004",
"Comment": "vim-X11-gtk2 is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553005",
"Comment": "vim-X11-gtk3 is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553006",
"Comment": "vim-common is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553007",
"Comment": "vim-console is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553008",
"Comment": "vim-enhanced is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553009",
"Comment": "vim-minimal is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553010",
"Comment": "vim-spell-source is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553011",
"Comment": "vimtutor is earlier than 4:9.0.1893-alt1"
},
{
"TestRef": "oval:org.altlinux.errata:tst:20235553012",
"Comment": "xxd is earlier than 4:9.0.1893-alt1"
}
]
}
]
}
}
]
}