ALT-BU-2022-3733-1
Branch sisyphus_e2k update bulletin.
Package scribus updated to version 1.5.7-alt4 for branch sisyphus_e2k.
Closed bugs
Segmentation fault
Package flatpak updated to version 1.12.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-43860
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Modified: 2024-11-21
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror-screenshots-url` is specified, then flatpak-builder will launch `flatpak build --nofilesystem=host appstream-utils mirror-screenshots` after finalization, which can lead to issues even with the `--nofilesystem=host` protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the `appstream-util` binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of `--nofilesystem=home` and `--nofilesystem=host`.
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-7e328bd66c
- FEDORA-2022-7e328bd66c
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Package vim updated to version 8.2.4146-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-05417
Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-05633
Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06187
Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды
BDU:2021-06188
Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи
BDU:2021-06189
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00978
Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-00979
Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации
BDU:2022-00980
Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации
BDU:2022-00981
Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-00989
Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2022-00990
Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00991
Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-05500
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05501
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05921
Уязвимость функции spell_iswordp() компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05922
Уязвимость компонента findfile.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05924
Уязвимость компонента regexp_nfa.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05970
Уязвимость функции getvcol компонента src/charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-07169
Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2023-00288
Уязвимость текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3770
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-e982f972f2
- FEDORA-2021-e982f972f2
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221124-0003/
- https://security.netapp.com/advisory/ntap-20221124-0003/
Modified: 2024-11-21
CVE-2021-3778
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0003/
- https://security.netapp.com/advisory/ntap-20221118-0003/
Modified: 2024-11-21
CVE-2021-3796
vim is vulnerable to Use After Free
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0004/
- https://security.netapp.com/advisory/ntap-20221118-0004/
Modified: 2024-11-21
CVE-2021-3872
vim is vulnerable to Heap-based Buffer Overflow
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3875
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3903
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-af135cabe2
- FEDORA-2021-af135cabe2
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
Modified: 2024-11-21
CVE-2021-3927
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3928
vim is vulnerable to Use of Uninitialized Variable
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3973
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3974
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3984
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4019
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-469afb66c9
- FEDORA-2021-469afb66c9
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4069
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-541ddd1f94
- FEDORA-2021-541ddd1f94
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4136
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4166
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4173
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4187
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4192
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4193
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0128
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0156
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0158
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0261
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Closed bugs
syntax/spec.vim не подсвечивает длинные CVE
Добавить подсветку тега vcs
Package openblas updated to version 0.3.19-alt1.1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4048
An out-of-bounds read flaw was found in the CLARRV, DLARRV, SLARRV, and ZLARRV functions in lapack through version 3.10.0, as also used in OpenBLAS before version 0.3.18. Specially crafted inputs passed to these functions could cause an application using lapack to crash or possibly disclose portions of its memory.
- https://github.com/JuliaLang/julia/issues/42415
- https://github.com/JuliaLang/julia/issues/42415
- https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
- https://github.com/Reference-LAPACK/lapack/commit/38f3eeee3108b18158409ca2a100e6fe03754781
- https://github.com/Reference-LAPACK/lapack/pull/625
- https://github.com/Reference-LAPACK/lapack/pull/625
- https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
- https://github.com/xianyi/OpenBLAS/commit/2be5ee3cca97a597f2ee2118808a2d5eacea050c
- https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
- https://github.com/xianyi/OpenBLAS/commit/337b65133df174796794871b3988cd03426e6d41
- https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
- https://github.com/xianyi/OpenBLAS/commit/ddb0ff5353637bb5f5ad060c9620e334c143e3d7
- https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
- https://github.com/xianyi/OpenBLAS/commit/fe497efa0510466fd93578aaf9da1ad8ed4edbe7
- FEDORA-2021-aec9d01057
- FEDORA-2021-aec9d01057
- FEDORA-2021-0d4b58060d
- FEDORA-2021-0d4b58060d