ALT-BU-2022-6079-1
Branch p9_mipsel update bulletin.
Closed vulnerabilities
BDU:2022-01796
Уязвимость функции do_checksum компонента checksum.c утилиты редактирования и воспроизведения Pcap Tcpreplay, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01817
Уязвимость функции randomize_iparp компонента edit_packet.c утилиты редактирования и воспроизведения Pcap Tcpreplay, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-12740
tcprewrite in Tcpreplay through 4.3.2 has a heap-based buffer over-read during a get_c operation. The issue is being triggered in the function get_ipv6_next() at common/get.c.
Modified: 2024-11-21
CVE-2020-18976
Buffer Overflow in Tcpreplay v4.3.2 allows attackers to cause a Denial of Service via the 'do_checksum' function in 'checksum.c'. It can be triggered by sending a crafted pcap file to the 'tcpreplay-edit' binary. This issue is different than CVE-2019-8381.
Modified: 2024-11-21
CVE-2020-23273
Heap-buffer overflow in the randomize_iparp function in edit_packet.c. of Tcpreplay v4.3.2 allows attackers to cause a denial of service (DOS) via a crafted pcap.
Modified: 2024-11-21
CVE-2020-24265
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in MemcmpInterceptorCommon() that can make tcpprep crash and cause a denial of service.
Modified: 2024-11-21
CVE-2020-24266
An issue was discovered in tcpreplay tcpprep v4.3.3. There is a heap buffer overflow vulnerability in get_l2len() that can make tcpprep crash and cause a denial of service.
Modified: 2024-11-21
CVE-2021-45386
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv6() at tree.c
Modified: 2024-11-21
CVE-2021-45387
tcpreplay 4.3.4 has a Reachable Assertion in add_tree_ipv4() at tree.c.
Package simple-scan updated to version 3.36.6-alt0.p9.1 for branch p9_mipsel.
Closed bugs
Не стартует simple-scan
Closed vulnerabilities
BDU:2022-02695
Уязвимость функции evdev_log_msg библиотеки libinput реализации протоколов серверов отображения X.Org и Wayland, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
Modified: 2024-11-21
CVE-2022-1215
A format string vulnerability was found in libinput
Package squashfs-tools updated to version 4.5.1-alt1 for branch p9_mipsel.
Closed vulnerabilities
BDU:2021-05217
Уязвимость функции squashfs_opendir компонента unsquash-1.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-06307
Уязвимость функции squashfs_opendir компонента unsquash-2.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/issues/72
- https://github.com/plougher/squashfs-tools/issues/72
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- FEDORA-2021-9fb6da134f
- FEDORA-2021-9fb6da134f
- FEDORA-2021-cdbd827c1e
- FEDORA-2021-cdbd827c1e
- GLSA-202305-29
- GLSA-202305-29
- DSA-4967
- DSA-4967
Modified: 2024-11-21
CVE-2021-41072
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- GLSA-202305-29
- GLSA-202305-29
- DSA-4987
- DSA-4987
Closed vulnerabilities
BDU:2021-05417
Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-05633
Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06187
Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды
BDU:2021-06188
Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи
BDU:2021-06189
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00978
Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-00979
Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации
BDU:2022-00980
Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации
BDU:2022-00981
Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-00982
Уязвимость функции utf_head_off() (mbyte.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00984
Уязвимость компонента spellsuggest.c текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00988
Уязвимость функции init_ccline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00989
Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2022-00990
Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00991
Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00992
Уязвимость функции getexmodeline() (ex_getln.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00993
Уязвимость функции yank_copy_line текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00996
Уязвимость функции win_lbr_chartabsize() текстового редактора vim, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01014
Уязвимость функции ex_retab() (indent.c) текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-01016
Уязвимость компонента src/ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-01026
Уязвимость компонента ex_cmds.c текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-01055
Уязвимость текстового редактора Vim, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01466
Уязвимость текстового редактора vim, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-02131
Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-02375
Уязвимость текстового редактора vim, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2022-02385
Уязвимость текстового редактора vim, связанная с записью за границами буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-03035
Уязвимость функции cmdline_erase_chars() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-03037
Уязвимость реализации функции vim_regexec_string() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03230
Уязвимость функции get_one_sourceline() текстового редактора Vim, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2022-03232
Уязвимость реализации функции skip_string() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03233
Уязвимость реализации функции vim_regexec_string() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03234
Уязвимость реализации функции vim_strncpy find_word() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03235
Уязвимость реализации функции find_next_quote() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03237
Уязвимость реализации функции find_pattern_in_path() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-03238
Уязвимость реализации функции vim_regsub_both() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-03239
Уязвимость реализации функции utfc_ptr2len() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-03240
Уязвимость текстового редактора Vim, вызванная неконтролируемой рекурсией, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03269
Уязвимость реализации функции skip_range() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-03270
Уязвимость текстового редактора Vim, связанная со смещением указателя за границы выделенной памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03271
Уязвимость реализации команды append текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-03909
Уязвимость функции get_one_sourceline() текстового редактора Vim, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-04025
Уязвимость функции skipwhite текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04208
Уязвимость функции skipwhite() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04209
Уязвимость компонента diff.c текстового редактора Vim, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
BDU:2022-04214
Уязвимость функции ins_bs() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2022-04215
Уязвимость функции get_lisp_indent() текстового редактора Vim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04216
Уязвимость функции parse_cmd_address() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04217
Уязвимость комопнента normal.c текстового редактора Vim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04218
Уязвимость комопнента register.c текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04219
Уязвимость функции ml_append_int() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04220
Уязвимость функции suggest_trie_walk() текстового редактора Vim, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или оказать другое воздействие
BDU:2022-04221
Уязвимость функции get_lisp_indent() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04222
Уязвимость функции current_quote() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04223
Уязвимость функции append_command() (ex_docmd.c) текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04224
Уязвимость компонента search.c текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04225
Уязвимость функции vim_regsub_both() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-04226
Уязвимость функции cmdline_insert_reg() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04572
Уязвимость компонента edit.c текстового редактора Vim, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2022-05500
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05501
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05523
Уязвимость функции utf_ptr2char() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05921
Уязвимость функции spell_iswordp() компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05922
Уязвимость компонента findfile.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05924
Уязвимость компонента regexp_nfa.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05925
Уязвимость компонента src/undo.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05970
Уязвимость функции getvcol компонента src/charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-05977
Уязвимость функции ex_retab компонента src/indent.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05978
Уязвимость функции enter_buffer() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05979
Уязвимость функции unix_expandpath() текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05980
Уязвимость функции gchar_cursor компонента misc1.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05981
Уязвимость функции find_pattern_in_path текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06480
Уязвимость функции vim_regsub_both компонента regexp.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06965
Уязвимость функции vim_regexec_string() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-07168
Уязвимость функции enter_buffer текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07169
Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2023-00288
Уязвимость текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3770
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-e982f972f2
- FEDORA-2021-e982f972f2
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221124-0003/
- https://security.netapp.com/advisory/ntap-20221124-0003/
Modified: 2024-11-21
CVE-2021-3778
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0003/
- https://security.netapp.com/advisory/ntap-20221118-0003/
Modified: 2024-11-21
CVE-2021-3796
vim is vulnerable to Use After Free
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0004/
- https://security.netapp.com/advisory/ntap-20221118-0004/
Modified: 2024-11-21
CVE-2021-3872
vim is vulnerable to Heap-based Buffer Overflow
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3875
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3903
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-af135cabe2
- FEDORA-2021-af135cabe2
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
Modified: 2024-11-21
CVE-2021-3927
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3928
vim is vulnerable to Use of Uninitialized Variable
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3973
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3974
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3984
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4019
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-469afb66c9
- FEDORA-2021-469afb66c9
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4069
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-541ddd1f94
- FEDORA-2021-541ddd1f94
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4136
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4166
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4173
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4187
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4192
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4193
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0128
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0156
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0158
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0261
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0318
Heap-based Buffer Overflow in vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
- https://github.com/vim/vim/commit/57df9e8a9f9ae1aafdde9b86b10ad907627a87dc
- https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
- https://huntr.dev/bounties/0d10ba02-b138-4e68-a284-67f781a62d08
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20241115-0004/
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0359
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
- https://github.com/vim/vim/commit/85b6747abc15a7a81086db31289cf1b8b17e6cb1
- https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
- https://huntr.dev/bounties/a3192d90-4f82-4a67-b7a6-37046cc88def
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0361
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
- https://github.com/vim/vim/commit/dc5490e2cbc8c16022a23b449b48c1bd0083f366
- https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
- https://huntr.dev/bounties/a055618c-0311-409c-a78a-99477121965b
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0368
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
- https://github.com/vim/vim/commit/8d02ce1ed75d008c34a5c9aaa51b67cbb9d33baa
- https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
- https://huntr.dev/bounties/bca9ce1f-400a-4bf9-9207-3f3187cb3fa9
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0392
Heap-based Buffer Overflow in GitHub repository vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
- https://github.com/vim/vim/commit/806d037671e133bd28a7864248763f643967973a
- https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
- https://huntr.dev/bounties/d00a2acd-1935-4195-9d5b-4115ef6b3126
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0393
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
- https://github.com/vim/vim/commit/a4bc2dd7cccf5a4a9f78b58b6f35a45d17164323
- https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
- https://huntr.dev/bounties/ecc8f488-01a0-477f-848f-e30b8e524bba
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-da2fb07efb
- FEDORA-2022-da2fb07efb
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0407
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
- https://github.com/vim/vim/commit/44db8213d38c39877d2148eff6a72f4beccfb94e
- https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
- https://huntr.dev/bounties/81822bf7-aafe-4d37-b836-1255d46e572c
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0408
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
- https://github.com/vim/vim/commit/06f15416bb8d5636200a10776f1752c4d6e49f31
- https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
- https://huntr.dev/bounties/5e635bad-5cf6-46cd-aeac-34ef224e179d
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-da2fb07efb
- FEDORA-2022-da2fb07efb
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0413
Use After Free in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
- https://github.com/vim/vim/commit/37f47958b8a2a44abc60614271d9537e7f14e51a
- https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
- https://huntr.dev/bounties/563d1e8f-5c3d-4669-941c-3216f4a87c38
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-da2fb07efb
- FEDORA-2022-da2fb07efb
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0417
Heap-based Buffer Overflow GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
- https://github.com/vim/vim/commit/652dee448618589de5528a9e9a36995803f5557a
- https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
- https://huntr.dev/bounties/fc86bc8d-c866-4ade-8b7f-e49cec306d1a
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-da2fb07efb
- FEDORA-2022-da2fb07efb
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0443
Use After Free in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
- https://github.com/vim/vim/commit/9b4a80a66544f2782040b641498754bcb5b8d461
- https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
- https://huntr.dev/bounties/b987c8cb-bbbe-4601-8a6c-54ff907c6b51
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-da2fb07efb
- FEDORA-2022-da2fb07efb
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2022-0554
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
- https://github.com/vim/vim/commit/e3537aec2f8d6470010547af28dcbd83d41461b8
- https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
- https://huntr.dev/bounties/7e8f6cd0-b5ee-48a2-8255-6a86f4c46c71
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0572
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
- https://github.com/vim/vim/commit/6e28703a8e41f775f64e442c5d11ce1ff599aa3f
- https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
- https://huntr.dev/bounties/bf3e0643-03e9-4436-a1c8-74e7111c32bf
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-9cef12c14c
- FEDORA-2022-9cef12c14c
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0629
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
- https://github.com/vim/vim/commit/34f8117dec685ace52cd9e578e2729db278163fc
- https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
- https://huntr.dev/bounties/95e2b0da-e480-4ee8-9324-a93a2ab0a877
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-8622ebdebb
- FEDORA-2022-8622ebdebb
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0685
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4418.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
- https://github.com/vim/vim/commit/5921aeb5741fc6e84c870d68c7c35b93ad0c9f87
- https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
- https://huntr.dev/bounties/27230da3-9b1a-4d5d-8cdf-4b1e62fcd782
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0696
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
- https://github.com/vim/vim/commit/0f6e28f686dbb59ab3b562408ab9b2234797b9b1
- https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
- https://huntr.dev/bounties/7416c2cb-1809-4834-8989-e84ff033f15f
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0714
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4436.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
- https://github.com/vim/vim/commit/4e889f98e95ac05d7c8bd3ee933ab4d47820fdfa
- https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
- https://huntr.dev/bounties/db70e8db-f309-4f3c-986c-e69d2415c3b3
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-63ca9a1129
- FEDORA-2022-63ca9a1129
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0729
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
- https://github.com/vim/vim/commit/6456fae9ba8e72c74b2c0c499eaf09974604ff30
- https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
- https://huntr.dev/bounties/f3f3d992-7bd6-4ee5-a502-ae0e5f8016ea
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-48bf3cb1c4
- FEDORA-2022-63ca9a1129
- FEDORA-2022-63ca9a1129
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-0943
Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
- https://github.com/vim/vim/commit/5c68617d395f9d7b824f68475b24ce3e38d653a3
- https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
- https://huntr.dev/bounties/9e4de32f-ad5f-4830-b3ae-9467b5ab90a1
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-b718ebbfce
- FEDORA-2022-b718ebbfce
- FEDORA-2022-e62adccfca
- FEDORA-2022-e62adccfca
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1154
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646.
- https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
- https://github.com/vim/vim/commit/b55986c52d4cd88a22d0b0b0e8a79547ba13e1d5
- https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
- https://huntr.dev/bounties/7f0ec6bc-ea0e-45b0-8128-caac72d23425
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-d776fcfe60
- FEDORA-2022-d776fcfe60
- FEDORA-2022-e62adccfca
- FEDORA-2022-e62adccfca
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-1160
heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2.4647.
- https://github.com/vim/vim/commit/2bdad6126778f907c0b98002bfebf0e611a3f5db
- https://github.com/vim/vim/commit/2bdad6126778f907c0b98002bfebf0e611a3f5db
- https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c
- https://huntr.dev/bounties/a6f3222d-2472-439d-8881-111138a5694c
- FEDORA-2022-d776fcfe60
- FEDORA-2022-d776fcfe60
- FEDORA-2022-e62adccfca
- FEDORA-2022-e62adccfca
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-1381
global heap buffer overflow in skip_range in GitHub repository vim/vim prior to 8.2.4763. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/f50808ed135ab973296bca515ae4029b321afe47
- https://github.com/vim/vim/commit/f50808ed135ab973296bca515ae4029b321afe47
- https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4
- https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4
- FEDORA-2022-b605768c94
- FEDORA-2022-b605768c94
- FEDORA-2022-e304fffd34
- FEDORA-2022-e304fffd34
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1420
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
- https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca
- https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
- https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
- FEDORA-2022-b605768c94
- FEDORA-2022-b605768c94
- FEDORA-2022-e304fffd34
- FEDORA-2022-e304fffd34
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1616
Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
- https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
- https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
- https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-e92c3ce170
- FEDORA-2022-e92c3ce170
- FEDORA-2022-8df66cdbef
- FEDORA-2022-8df66cdbef
- FEDORA-2022-f0db3943d9
- FEDORA-2022-f0db3943d9
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1619
Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
- https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
- https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
- https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-e92c3ce170
- FEDORA-2022-e92c3ce170
- FEDORA-2022-8df66cdbef
- FEDORA-2022-8df66cdbef
- FEDORA-2022-f0db3943d9
- FEDORA-2022-f0db3943d9
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20220930-0007/
- https://security.netapp.com/advisory/ntap-20220930-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1620
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
- https://github.com/vim/vim/commit/8e4b76da1d7e987d43ca960dfbc372d1c617466f
- https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
- https://huntr.dev/bounties/7a4c59f3-fcc0-4496-995d-5ca6acd2da51
- FEDORA-2022-e92c3ce170
- FEDORA-2022-e92c3ce170
- FEDORA-2022-8df66cdbef
- FEDORA-2022-8df66cdbef
- FEDORA-2022-f0db3943d9
- FEDORA-2022-f0db3943d9
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1621
Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
- https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
- https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
- https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-8df66cdbef
- FEDORA-2022-8df66cdbef
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1629
Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
- https://github.com/vim/vim/commit/53a70289c2712808e6d4e88927e03cac01b470dd
- https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
- https://huntr.dev/bounties/e26d08d4-1886-41f0-9af4-f3e1bf3d52ee
- FEDORA-2022-8df66cdbef
- FEDORA-2022-8df66cdbef
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1674
NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060
- https://github.com/vim/vim/commit/a59f2dfd0cf9ee1a584d3de5b7c2d47648e79060
- https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
- https://huntr.dev/bounties/a74ba4a4-7a39-4a22-bde3-d2f8ee07b385
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-74b9e404c1
- FEDORA-2022-74b9e404c1
- FEDORA-2022-d20b51de9c
- FEDORA-2022-d20b51de9c
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1720
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
- https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
- https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
- https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1725
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/b62dc5e7825bc195efe3041d5b3a9f1528359e1c
- https://github.com/vim/vim/commit/b62dc5e7825bc195efe3041d5b3a9f1528359e1c
- https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
- https://huntr.dev/bounties/4363cf07-233e-4d0a-a1d5-c731a400525c
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1733
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813
- https://github.com/vim/vim/commit/60ae0e71490c97f2871a6344aca61cacf220f813
- https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
- https://huntr.dev/bounties/6ff03b27-472b-4bef-a2bf-410fae65ff0a
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-74b9e404c1
- FEDORA-2022-74b9e404c1
- FEDORA-2022-d6d1ac4ca7
- FEDORA-2022-d6d1ac4ca7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1735
Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97
- https://github.com/vim/vim/commit/7ce5b2b590256ce53d6af28c1d203fb3bc1d2d97
- https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
- https://huntr.dev/bounties/c9f85608-ff11-48e4-933d-53d1759d44d9
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1769
Buffer Over-read in GitHub repository vim/vim prior to 8.2.4974.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4
- https://github.com/vim/vim/commit/4748c4bd64610cf943a431d215bb1aad51f8d0b4
- https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
- https://huntr.dev/bounties/522076b2-96cb-4df6-a504-e6e2f64c171c
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-d044e7e0b4
- FEDORA-2022-74b9e404c1
- FEDORA-2022-74b9e404c1
- FEDORA-2022-d6d1ac4ca7
- FEDORA-2022-d6d1ac4ca7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1771
Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975.
- https://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8
- https://github.com/vim/vim/commit/51f0bfb88a3554ca2dde777d78a59880d1ee37a8
- https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
- https://huntr.dev/bounties/faa74175-5317-4b71-a363-dfc39094ecbb
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-1785
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
- https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
- https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
- https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
- https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-1796
Use After Free in GitHub repository vim/vim prior to 8.2.4979.
- https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5
- https://github.com/vim/vim/commit/28d032cc688ccfda18c5bbcab8b50aba6e18cde5
- https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
- https://huntr.dev/bounties/f6739b58-49f9-4056-a843-bf76bbc1253e
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-1851
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad
- https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad
- https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d
- https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-d94440bf0e
- FEDORA-2022-d94440bf0e
- FEDORA-2022-5ce148636b
- FEDORA-2022-5ce148636b
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1886
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/2a585c85013be22f59f184d49612074fd9b115d7
- https://github.com/vim/vim/commit/2a585c85013be22f59f184d49612074fd9b115d7
- https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
- https://huntr.dev/bounties/fa0ad526-b608-45b3-9ebc-f2b607834d6a
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-1898
Use After Free in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a
- https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a
- https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea
- https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-d94440bf0e
- FEDORA-2022-d94440bf0e
- FEDORA-2022-5ce148636b
- FEDORA-2022-5ce148636b
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1927
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
- https://github.com/vim/vim/commit/4d97a565ae8be0d4debba04ebd2ac3e75a0c8010
- https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
- https://huntr.dev/bounties/945107ef-0b27-41c7-a03c-db99def0e777
- FEDORA-2022-d94440bf0e
- FEDORA-2022-d94440bf0e
- FEDORA-2022-5ce148636b
- FEDORA-2022-5ce148636b
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1942
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
- https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
- https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
- https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-1968
Use After Free in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
- https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
- https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
- https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2000
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/44a3f3353e0407e9fffee138125a6927d1c9e7e5
- https://github.com/vim/vim/commit/44a3f3353e0407e9fffee138125a6927d1c9e7e5
- https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0
- https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-c302c5f62d
- FEDORA-2022-c302c5f62d
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2042
Use After Free in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/2813f38e021c6e6581c0c88fcf107e41788bc835
- https://github.com/vim/vim/commit/2813f38e021c6e6581c0c88fcf107e41788bc835
- https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
- https://huntr.dev/bounties/8628b4cd-4055-4059-aed4-64f7fdc10eba
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2124
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
- https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
- https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
- https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2125
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
- https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
- https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
- https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2126
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- 20221030 APPLE-SA-2022-10-27-9 Additional information for APPLE-SA-2022-09-12-3 macOS Big Sur 11.7
- https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
- https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
- https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
- https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213443
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Modified: 2024-11-21
CVE-2022-2129
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
- https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
- https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
- https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2175
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e
- https://github.com/vim/vim/commit/6046aded8da002b08d380db29de2ba0268b6616e
- https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
- https://huntr.dev/bounties/7f0481c2-8b57-4324-b47c-795d1ea67e55
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2182
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e
- https://github.com/vim/vim/commit/f7c7c3fad6d2135d558f3b36d0d1a943118aeb5e
- https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
- https://huntr.dev/bounties/238d8650-3beb-4831-a8f7-6f0b597a6fb8
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2183
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa
- https://github.com/vim/vim/commit/8eba2bd291b347e3008aa9e565652d51ad638cfa
- https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
- https://huntr.dev/bounties/d74ca3f9-380d-4c0a-b61c-11113cc98975
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2206
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908
- https://github.com/vim/vim/commit/e178af5a586ea023622d460779fdcabbbfac0908
- https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
- https://huntr.dev/bounties/01d01e74-55d0-4d9e-878e-79ba599be668
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2207
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b
- https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b
- https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
- https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2208
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.
- https://github.com/vim/vim/commit/cd38bb4d83c942c4bad596835c6766cbf32e5195
- https://github.com/vim/vim/commit/cd38bb4d83c942c4bad596835c6766cbf32e5195
- https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
- https://huntr.dev/bounties/7bfe3d5b-568f-4c34-908f-a39909638cc1
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2210
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa
- https://github.com/vim/vim/commit/c101abff4c6756db4f5e740fde289decb9452efa
- https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
- https://huntr.dev/bounties/020845f8-f047-4072-af0f-3726fe1aea25
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2231
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.
- https://github.com/vim/vim/commit/79481367a457951aabd9501b510fd7e3eb29c3d8
- https://github.com/vim/vim/commit/79481367a457951aabd9501b510fd7e3eb29c3d8
- https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
- https://huntr.dev/bounties/8dae6ab4-7a7a-4716-a65c-9b090fa057b5
- FEDORA-2022-719f3ec21b
- FEDORA-2022-719f3ec21b
- FEDORA-2022-bb7f3cacbf
- FEDORA-2022-bb7f3cacbf
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Closed bugs
syntax/spec.vim не подсвечивает длинные CVE
Добавить подсветку тега vcs
не закрыты: CVE-2022-1381, CVE-2022-1616, CVE-2022-1621, CVE-2022-1733, CVE-2022-1629, CVE-2022-1785
Package usb-modeswitch updated to version 2.6.1-alt3 for branch p9_mipsel.
Closed bugs
На вход утилите usb_modeswitch_dispatcher передаётся неверный параметр, либо он неправильно обрабатывается
Closed vulnerabilities
BDU:2022-02263
Уязвимость инструмента мониторинга Glances, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-23418
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/issues/1025
- https://github.com/nicolargo/glances/issues/1025
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
Closed bugs
teamd@.service безполезен
Не работает NetworkManager + teamd
teamd 100% CPU usage
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-2509
A vulnerability found in gnutls. This security flaw happens because of a double free error occurs during verification of pkcs7 signatures in gnutls_pkcs7_verify function.
- https://access.redhat.com/security/cve/CVE-2022-2509
- https://access.redhat.com/security/cve/CVE-2022-2509
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update
- [debian-lts-announce] 20220812 [SECURITY] [DLA 3070-1] gnutls28 security update
- FEDORA-2022-5470992bfc
- FEDORA-2022-5470992bfc
- https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
- https://lists.gnupg.org/pipermail/gnutls-help/2022-July/004746.html
- DSA-5203
- DSA-5203
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3618
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
- https://alpaca-attack.com/
- https://alpaca-attack.com/
- https://bugzilla.redhat.com/show_bug.cgi?id=1975623
- https://bugzilla.redhat.com/show_bug.cgi?id=1975623
- [debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update
- [debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update
Package alt-csp-cryptopro updated to version 0.2.6-alt1 for branch p9_mipsel.
Closed bugs
LibreOffice-plugin-altcsp: Проверить некорректный файл подписи -> Ошибок нет
Нет сертификата в списке сертификатов
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-37750
The Key Distribution Center (KDC) in MIT Kerberos 5 (aka krb5) before 1.18.5 and 1.19.x before 1.19.3 has a NULL pointer dereference in kdc/do_tgs_req.c via a FAST inner body that lacks a server field.
- https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
- https://github.com/krb5/krb5/commit/d775c95af7606a51bf79547a94fa52ddd1cb7f49
- https://github.com/krb5/krb5/releases
- https://github.com/krb5/krb5/releases
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2771-1] krb5 security update
- FEDORA-2021-f2c8514f02
- FEDORA-2021-f2c8514f02
- https://security.netapp.com/advisory/ntap-20210923-0002/
- https://security.netapp.com/advisory/ntap-20210923-0002/
- https://web.mit.edu/kerberos/advisories/
- https://web.mit.edu/kerberos/advisories/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.starwindsoftware.com/security/sw-20220817-0004/
- https://www.starwindsoftware.com/security/sw-20220817-0004/
Closed vulnerabilities
BDU:2021-05776
Уязвимость компонента Modbus анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05777
Уязвимость службы Bluetooth SDP анализатора трафика компьютерных сетей Wireshark , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05801
Уязвимость службы Bluetooth DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05836
Уязвимость компонента C12.22 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05837
Уязвимость службы Bluetooth HCI_ISO анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05936
Уязвимость набора стандартов связи для коммуникации IEEE 802.11 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05943
Уязвимость диссектора IPPUSB анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00029
Уязвимость службы Bluetooth DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02437
Уязвимость диссектора RTMPT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02438
Уязвимость диссектора BitTorrent DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02439
Уязвимость диссектора Sysdig Event анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-39920
NULL pointer exception in the IPPUSB dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39920.json
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- https://gitlab.com/wireshark/wireshark/-/issues/17705
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-15.html
- https://www.wireshark.org/security/wnpa-sec-2021-15.html
Modified: 2024-11-21
CVE-2021-39921
NULL pointer exception in the Modbus dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39921.json
- https://gitlab.com/wireshark/wireshark/-/issues/17703
- https://gitlab.com/wireshark/wireshark/-/issues/17703
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-14.html
- https://www.wireshark.org/security/wnpa-sec-2021-14.html
Modified: 2024-11-21
CVE-2021-39922
Buffer overflow in the C12.22 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39922.json
- https://gitlab.com/wireshark/wireshark/-/issues/17636
- https://gitlab.com/wireshark/wireshark/-/issues/17636
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-12.html
- https://www.wireshark.org/security/wnpa-sec-2021-12.html
Modified: 2024-11-21
CVE-2021-39923
Large loop in the PNRP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39923.json
- https://gitlab.com/wireshark/wireshark/-/issues/17684
- https://gitlab.com/wireshark/wireshark/-/issues/17684
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-11.html
- https://www.wireshark.org/security/wnpa-sec-2021-11.html
Modified: 2024-11-21
CVE-2021-39924
Large loop in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39924.json
- https://gitlab.com/wireshark/wireshark/-/issues/17677
- https://gitlab.com/wireshark/wireshark/-/issues/17677
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-10.html
- https://www.wireshark.org/security/wnpa-sec-2021-10.html
Modified: 2024-11-21
CVE-2021-39925
Buffer overflow in the Bluetooth SDP dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39925.json
- https://gitlab.com/wireshark/wireshark/-/issues/17635
- https://gitlab.com/wireshark/wireshark/-/issues/17635
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-09.html
- https://www.wireshark.org/security/wnpa-sec-2021-09.html
Modified: 2024-11-21
CVE-2021-39926
Buffer overflow in the Bluetooth HCI_ISO dissector in Wireshark 3.4.0 to 3.4.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39926.json
- https://gitlab.com/wireshark/wireshark/-/issues/17649
- https://gitlab.com/wireshark/wireshark/-/issues/17649
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-08.html
- https://www.wireshark.org/security/wnpa-sec-2021-08.html
Modified: 2024-11-21
CVE-2021-39928
NULL pointer exception in the IEEE 802.11 dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39928.json
- https://gitlab.com/wireshark/wireshark/-/issues/17704
- https://gitlab.com/wireshark/wireshark/-/issues/17704
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-13.html
- https://www.wireshark.org/security/wnpa-sec-2021-13.html
Modified: 2024-11-21
CVE-2021-39929
Uncontrolled Recursion in the Bluetooth DHT dissector in Wireshark 3.4.0 to 3.4.9 and 3.2.0 to 3.2.17 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-39929.json
- https://gitlab.com/wireshark/wireshark/-/issues/17651
- https://gitlab.com/wireshark/wireshark/-/issues/17651
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- [debian-lts-announce] 20211226 [SECURITY] [DLA 2849-1] wireshark security update
- FEDORA-2021-3747cf6107
- FEDORA-2021-3747cf6107
- FEDORA-2021-97bd631e0a
- FEDORA-2021-97bd631e0a
- GLSA-202210-04
- GLSA-202210-04
- DSA-5019
- DSA-5019
- https://www.wireshark.org/security/wnpa-sec-2021-07.html
- https://www.wireshark.org/security/wnpa-sec-2021-07.html
Modified: 2024-11-21
CVE-2021-4181
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
Modified: 2024-11-21
CVE-2021-4182
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
Modified: 2024-11-21
CVE-2021-4183
Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
Modified: 2024-11-21
CVE-2021-4184
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
Modified: 2024-11-21
CVE-2021-4185
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
Modified: 2024-11-21
CVE-2021-4186
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
Modified: 2024-11-21
CVE-2021-4190
Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
Modified: 2024-11-21
CVE-2022-0581
Crash in the CMS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0581.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0581.json
- https://gitlab.com/wireshark/wireshark/-/issues/17935
- https://gitlab.com/wireshark/wireshark/-/issues/17935
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-5a3603afe0
- FEDORA-2022-5a3603afe0
- FEDORA-2022-e29665a42b
- FEDORA-2022-e29665a42b
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2022-05.html
- https://www.wireshark.org/security/wnpa-sec-2022-05.html
Modified: 2024-11-21
CVE-2022-0582
Unaligned access in the CSN.1 protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0582.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0582.json
- https://gitlab.com/wireshark/wireshark/-/issues/17882
- https://gitlab.com/wireshark/wireshark/-/issues/17882
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-5a3603afe0
- FEDORA-2022-5a3603afe0
- FEDORA-2022-e29665a42b
- FEDORA-2022-e29665a42b
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2022-04.html
- https://www.wireshark.org/security/wnpa-sec-2022-04.html
Modified: 2024-11-21
CVE-2022-0583
Crash in the PVFS protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0583.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0583.json
- https://gitlab.com/wireshark/wireshark/-/issues/17840
- https://gitlab.com/wireshark/wireshark/-/issues/17840
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-5a3603afe0
- FEDORA-2022-5a3603afe0
- FEDORA-2022-e29665a42b
- FEDORA-2022-e29665a42b
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2022-03.html
- https://www.wireshark.org/security/wnpa-sec-2022-03.html
Modified: 2024-11-21
CVE-2022-0585
Large loops in multiple protocol dissectors in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allow denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0585.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0585.json
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-5a3603afe0
- FEDORA-2022-5a3603afe0
- FEDORA-2022-e29665a42b
- FEDORA-2022-e29665a42b
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2022-02.html
- https://www.wireshark.org/security/wnpa-sec-2022-02.html
Modified: 2024-11-21
CVE-2022-0586
Infinite loop in RTMPT protocol dissector in Wireshark 3.6.0 to 3.6.1 and 3.4.0 to 3.4.11 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-0586.json
- https://gitlab.com/wireshark/wireshark/-/issues/17813
- https://gitlab.com/wireshark/wireshark/-/issues/17813
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-5a3603afe0
- FEDORA-2022-5a3603afe0
- FEDORA-2022-e29665a42b
- FEDORA-2022-e29665a42b
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2022-01.html
- https://www.wireshark.org/security/wnpa-sec-2022-01.html
Closed vulnerabilities
BDU:2022-00590
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2022-00591
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с непринятием мер по защите структуры запроса SQL, позволяющая нарушителю выполнять произвольный SQL-запрос
BDU:2022-04910
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2022-21719
GLPI is a free asset and IT management software package. All GLPI versions prior to 9.5.7 are vulnerable to reflected cross-site scripting. Version 9.5.7 contains a patch for this issue. There are no known workarounds.
- https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48
- https://github.com/glpi-project/glpi/commit/e9b16bc8e9b61ebb2d35b96b9c71cd25c5af9e48
- https://github.com/glpi-project/glpi/releases/tag/9.5.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j
- https://github.com/glpi-project/glpi/security/advisories/GHSA-6cj4-g839-gj5j
Modified: 2024-11-21
CVE-2022-21720
GLPI is a free asset and IT management software package. Prior to version 9.5.7, an entity administrator is capable of retrieving normally inaccessible data via SQL injection. Version 9.5.7 contains a patch for this issue. As a workaround, disabling the `Entities` update right prevents exploitation of this vulnerability.
- https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326
- https://github.com/glpi-project/glpi/commit/5c3eee696b503fdf502f506b00d15cf5b324b326
- https://github.com/glpi-project/glpi/releases/tag/9.5.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83
- https://github.com/glpi-project/glpi/security/advisories/GHSA-5hg4-r64r-rf83
Modified: 2024-11-21
CVE-2022-24868
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.
- https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f
- https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f
- https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78
- https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78
Modified: 2024-11-21
CVE-2022-24869
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can use ticket's followups or setup login messages with a stylesheet link. This may allow for a cross site scripting attack vector. This issue is partially mitigated by cors security of browsers, though users are still advised to upgrade.
- https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20
- https://github.com/glpi-project/glpi/blob/10.0/bugfixes/CHANGELOG.md#1000-2022-04-20
- https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e
- https://github.com/glpi-project/glpi/commit/ac9f1f03c5d2545b7e290197dbfebc3f752f810e
- https://github.com/glpi-project/glpi/releases/tag/10.0.0
- https://github.com/glpi-project/glpi/releases/tag/10.0.0
- https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx
- https://github.com/glpi-project/glpi/security/advisories/GHSA-p94c-8qp5-gfpx
Modified: 2024-11-21
CVE-2022-31061
GLPI is a Free Asset and IT Management Software package, Data center management, ITIL Service Desk, licenses tracking and software auditing. In affected versions there is a SQL injection vulnerability which is possible on login page. No user credentials are required to exploit this vulnerability. Users are advised to upgrade as soon as possible. There are no known workarounds for this issue.
- https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514
- https://github.com/glpi-project/glpi/commit/21ae07d00d0b3230f6235386e98388cfc5bb0514
- https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq
- https://github.com/glpi-project/glpi/security/advisories/GHSA-w2gc-v2gm-q7wq
Closed bugs
Не работает запуск обновления политик для определенного пользователя
Closed vulnerabilities
BDU:2022-05754
Уязвимость сервера DNS BIND, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-25220
BIND 9.11.0 -> 9.11.36 9.12.0 -> 9.16.26 9.17.0 -> 9.18.0 BIND Supported Preview Editions: 9.11.4-S1 -> 9.11.36-S1 9.16.8-S1 -> 9.16.26-S1 Versions of BIND 9 earlier than those shown - back to 9.1.0, including Supported Preview Editions - are also believed to be affected but have not been tested as they are EOL. The cache could become poisoned with incorrect records leading to queries being made to the wrong servers, which might also result in false information being returned to clients.
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-637483.pdf
- https://kb.isc.org/v1/docs/cve-2021-25220
- https://kb.isc.org/v1/docs/cve-2021-25220
- FEDORA-2022-05918f0838
- FEDORA-2022-05918f0838
- FEDORA-2022-a88218de5c
- FEDORA-2022-a88218de5c
- FEDORA-2022-042d9c6146
- FEDORA-2022-042d9c6146
- FEDORA-2022-3f293290c3
- FEDORA-2022-3f293290c3
- FEDORA-2022-14e36aac0c
- FEDORA-2022-14e36aac0c
- GLSA-202210-25
- GLSA-202210-25
- https://security.netapp.com/advisory/ntap-20220408-0001/
- https://security.netapp.com/advisory/ntap-20220408-0001/
- https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
- https://supportportal.juniper.net/s/article/2022-10-Security-Bulletin-Junos-OS-SRX-Series-Cache-poisoning-vulnerability-in-BIND-used-by-DNS-Proxy-CVE-2021-25220?language=en_US
Package postgresql12 updated to version 12.12-alt0.M90P.1 for branch p9_mipsel.
Closed vulnerabilities
BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных
Modified: 2024-11-21
CVE-2022-1552
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- GLSA-202211-04
- GLSA-202211-04
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/support/security/CVE-2022-1552/
- https://www.postgresql.org/support/security/CVE-2022-1552/
Modified: 2024-11-21
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- GLSA-202211-04
- GLSA-202211-04
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
Package postgresql10 updated to version 10.22-alt0.M90P.1 for branch p9_mipsel.
Closed vulnerabilities
BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных
Modified: 2024-11-21
CVE-2022-1552
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- GLSA-202211-04
- GLSA-202211-04
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/support/security/CVE-2022-1552/
- https://www.postgresql.org/support/security/CVE-2022-1552/
Modified: 2024-11-21
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- GLSA-202211-04
- GLSA-202211-04
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
Package postgresql11 updated to version 11.17-alt0.M90P.1 for branch p9_mipsel.
Closed vulnerabilities
BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных
Modified: 2024-11-21
CVE-2022-1552
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- GLSA-202211-04
- GLSA-202211-04
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/support/security/CVE-2022-1552/
- https://www.postgresql.org/support/security/CVE-2022-1552/
Modified: 2024-11-21
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- GLSA-202211-04
- GLSA-202211-04
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
Closed vulnerabilities
BDU:2022-01455
Уязвимость веб-сервера Apache HTTP Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01456
Уязвимость веб-сервера Apache HTTP Server, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"
BDU:2022-01457
Уязвимость веб-сервера Apache HTTP Server, связанная с недостатками проверки вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01461
Уязвимость веб-сервера Apache HTTP Server, связанная с записью за пределами буфера памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-22719
A carefully crafted request body can cause a read to a random memory area which could cause the process to crash. This issue affects Apache HTTP Server 2.4.52 and earlier.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220314 CVE-2022-22719: Apache HTTP Server: mod_lua Use of uninitialized value of in r:parsebody
- [oss-security] 20220314 CVE-2022-22719: Apache HTTP Server: mod_lua Use of uninitialized value of in r:parsebody
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
Modified: 2024-11-21
CVE-2022-22720
Apache HTTP Server 2.4.52 and earlier fails to close inbound connection when errors are encountered discarding the request body, exposing the server to HTTP Request Smuggling
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier
- [oss-security] 20220314 CVE-2022-22720: HTTP request smuggling vulnerability in Apache HTTP Server 2.4.52 and earlier
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-22721
If LimitXMLRequestBody is set to allow request bodies larger than 350MB (defaults to 1M) on 32 bit systems an integer overflow happens which later causes out of bounds writes. This issue affects Apache HTTP Server 2.4.52 and earlier.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220314 CVE-2022-22721: Apache HTTP Server: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody
- [oss-security] 20220314 CVE-2022-22721: Apache HTTP Server: core: Possible buffer overflow with very large or unlimited LimitXMLRequestBody
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-23943
Out-of-bounds Write vulnerability in mod_sed of Apache HTTP Server allows an attacker to overwrite heap memory with possibly attacker provided data. This issue affects Apache HTTP Server 2.4 version 2.4.52 and prior versions.
- [oss-security] 20220314 CVE-2022-23943: Apache HTTP Server: mod_sed: Read/write beyond bounds
- [oss-security] 20220314 CVE-2022-23943: Apache HTTP Server: mod_sed: Read/write beyond bounds
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- [debian-lts-announce] 20220322 [SECURITY] [DLA 2960-1] apache2 security update
- FEDORA-2022-b4103753e9
- FEDORA-2022-b4103753e9
- FEDORA-2022-78e3211c55
- FEDORA-2022-78e3211c55
- FEDORA-2022-21264ec6db
- FEDORA-2022-21264ec6db
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://security.netapp.com/advisory/ntap-20220321-0001/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09
Package postgresql12-1C updated to version 12.11-alt0.M90P.3 for branch p9_mipsel.
Closed vulnerabilities
BDU:2022-04971
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками при использовании команд OR расширениями, позволяющая нарушителю повысить свои привилегии и заменить произвольные объекты в базе данных
Modified: 2024-11-21
CVE-2022-1552
A flaw was found in PostgreSQL. There is an issue with incomplete efforts to operate safely when a privileged user is maintaining another user's objects. The Autovacuum, REINDEX, CREATE INDEX, REFRESH MATERIALIZED VIEW, CLUSTER, and pg_amcheck commands activated relevant protections too late or not at all during the process. This flaw allows an attacker with permission to create non-temporary objects in at least one schema to execute arbitrary SQL functions under a superuser identity.
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://access.redhat.com/security/cve/CVE-2022-1552
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- https://bugzilla.redhat.com/show_bug.cgi?id=2081126
- GLSA-202211-04
- GLSA-202211-04
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://security.netapp.com/advisory/ntap-20221104-0005/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/about/news/postgresql-143-137-1211-1116-and-1021-released-2449/
- https://www.postgresql.org/support/security/CVE-2022-1552/
- https://www.postgresql.org/support/security/CVE-2022-1552/
Modified: 2024-11-21
CVE-2022-2625
A vulnerability was found in PostgreSQL. This attack requires permission to create non-temporary objects in at least one schema, the ability to lure or wait for an administrator to create or update an affected extension in that schema, and the ability to lure or wait for a victim to use the object targeted in CREATE OR REPLACE or CREATE IF NOT EXISTS. Given all three prerequisites, this flaw allows an attacker to run arbitrary code as the victim role, which may be a superuser.
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- https://bugzilla.redhat.com/show_bug.cgi?id=2113825
- GLSA-202211-04
- GLSA-202211-04
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
- https://www.postgresql.org/about/news/postgresql-145-138-1212-1117-1022-and-15-beta-3-released-2496/
Closed vulnerabilities
BDU:2022-02931
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02932
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02933
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02934
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03420
Уязвимость пакета антивирусных программ ClamAV, связанная с переполнением буфера в куче, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-20770
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20771
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20785
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20792
A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user.
Modified: 2024-11-21
CVE-2022-20796
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022