ID

VAR-202205-0855


CVE

CVE-2022-1621


TITLE

Vim Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202205-2826

DESCRIPTION

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution. Relevant releases/architectures: Red Hat Enterprise Linux AppStream (v. 9) - aarch64, noarch, ppc64le, s390x, x86_64 3. Bugs fixed (https://bugzilla.redhat.com/): 2058483 - CVE-2022-0554 vim: Use of Out-of-range Pointer Offset in vim 2064064 - CVE-2022-0943 vim: Heap-based Buffer Overflow occurs in vim 2073013 - CVE-2022-1154 vim: use after free in utf_ptr2char 2077734 - CVE-2022-1420 vim: Out-of-range Pointer Offset 2083924 - CVE-2022-1621 vim: heap buffer overflow 2083931 - CVE-2022-1629 vim: buffer over-read 6. Package List: Red Hat Enterprise Linux AppStream (v. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. Clusters and applications are all visible and managed from a single console—with security policy built in. See the following Release Notes documentation, which will be updated shortly for this release, for additional details about this release: https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/ Security update: * nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account (CVE-2022-24450) Bug fixes: * Can't install submariner add-ons from UI on unsupported cloud provider (BZ# 2087686) * policy controller addons are Progressing status (unhealthy from backend) on OCP3.11 in ARM hub (BZ# 2088270) * RHACM 2.5.1 images (BZ# 2090802) * Broken link to Submariner manual install instructions (BZ# 2095333) * `The backend service is unavailable` when accessing ACM 2.5 Overview page (BZ# 2096389) * 64 character length causing clusters to unsubscribe (BZ# 2101453) 3. Bugs fixed (https://bugzilla.redhat.com/): 2052573 - CVE-2022-24450 nats-server: misusing the "dynamically provisioned sandbox accounts" feature authenticated user can obtain the privileges of the System account 2087686 - Can't install submariner add-ons from UI on unsupported cloud provider 2088270 - policy controller addons are Progressing status (unhealthy from backend) on OCP3.11 in ARM hub 2090802 - RHACM 2.5.1 images 2095333 - Broken link to Submariner manual install instructions 2096389 - `The backend service is unavailable` when accessing ACM 2.5 Overview page 2101453 - 64 character length causing clusters to unsubscribe 5. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Moderate: ACS 3.71 enhancement and security update Advisory ID: RHSA-2022:5704-01 Product: RHACS Advisory URL: https://access.redhat.com/errata/RHSA-2022:5704 Issue date: 2022-07-25 CVE Names: CVE-2021-40528 CVE-2022-1621 CVE-2022-1629 CVE-2022-22576 CVE-2022-25313 CVE-2022-25314 CVE-2022-27774 CVE-2022-27776 CVE-2022-27782 CVE-2022-29173 CVE-2022-29824 ==================================================================== 1. Summary: Updated images are now available for Red Hat Advanced Cluster Security. The updated image includes bug fixes and feature improvements. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Description: Release of ACS 3.71 provides these changes: Security Fix(es): * go-tuf: No protection against rollback attacks for roles other than root (CVE-2022-29173) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. New Features: * New RHACS dashboard and widgets * New default policy for privilege escalation: detects if a deployment is running with a container that has allowPrivilegeEscalation set to true. This policy is enabled by default. The privilege escalation setting is enabled in Kubernetes pods by default. * New default policy for externally exposed service: detects if a deployment has any service that is externally exposed through any methods. The policy is disabled by default. * Ability to assign multiple RHACS roles to users and groups: Allows you to assign multiple roles using key-value pairs to a single user or group. * List of network policies in Deployment tab for violations: A new information section has been added to help resolve a "missing Kubernetes network policy" violation that lists all the Kubernetes network policies applicable to the namespace of the offending deployment. * Alpine 3.16 support for Scanner Enhancements: * Change to roxctl image scan behavior: The default value for the - --include-snoozed option of the roxctl image scan command is set to false. If the --include-snoozed option is set to false, the scan does not include snoozed CVEs. * Diagnostic bundles update: These now include notifiers, auth providers and auth provider groups, access control roles with attached permission set and access scope, and system configuration information. Users with the DebugLogs permission can read listed entities from a generated diagnostic bundle regardless of their respective permissions. * Align OCP4-CIS scanning benchmarks control numbers: The CIS control number has been added to compliance scan results to enable customers to reference the original control from the CIS benchmark standard. Notable technical changes: * eBPF is now the default collection method: Updated the default collection method for Collector to eBPF. Deprecated features: * RenamePolicyCategory and DeletePolicyCategory API endpoints * Permissions: AuthPlugin, AuthProvider, Group, Licenses, Role, User, Indicator, NetworkBaseline, ProcessWhitelist, Risk, APIToken, BackupPlugins, ImageIntegration, Notifier, SignatureIntegration, ImageComponent * Retrieving groups by property * vulns fields of storage.Node object in response payload of v1/nodes * /v1/cves/suppress and /v1/cves/unsuppress Removed features: * Anchore, Tenable, and Docker Trusted Registry integrations * External authorization plug-in for scoped access control * FROM option in the Disallowed Dockerfile line policy field * PodSecurityPolicy (PSP) Kubernetes objects 3. Solution: To take advantage of the new features, bug fixes, and enhancements in RHACS 3.71 you are advised to upgrade to RHACS 3.71.0. For details on how to apply this update, which includes the changes described in this advisory, refer to: https://access.redhat.com/articles/11258 4. Bugs fixed (https://bugzilla.redhat.com/): 2082400 - CVE-2022-29173 go-tuf: No protection against rollback attacks for roles other than root 5. JIRA issues fixed (https://issues.jboss.org/): ROX-11898 - Release RHACS 3.71.0 6. References: https://access.redhat.com/security/cve/CVE-2021-40528 https://access.redhat.com/security/cve/CVE-2022-1621 https://access.redhat.com/security/cve/CVE-2022-1629 https://access.redhat.com/security/cve/CVE-2022-22576 https://access.redhat.com/security/cve/CVE-2022-25313 https://access.redhat.com/security/cve/CVE-2022-25314 https://access.redhat.com/security/cve/CVE-2022-27774 https://access.redhat.com/security/cve/CVE-2022-27776 https://access.redhat.com/security/cve/CVE-2022-27782 https://access.redhat.com/security/cve/CVE-2022-29173 https://access.redhat.com/security/cve/CVE-2022-29824 https://access.redhat.com/security/updates/classification/#moderate 7. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYuFju9zjgjWX9erEAQiWQw/+OGMhyOtp3q6Ypqpl1hEi3YCkXQOsdzmR V/2ULky7w4rO8xA9u8hZjDtrsxhHmY3PSYv2fRxLAX87d0FJEoUOGJ7JEQT+L+VF 08Zqzz+CRUVBubN27UKdMb8nAZ0S083XleTGd0u/gLTvdejRsfsNvfs+rlOSxv1c mlChC8HXlVg5UH6OAEspZ2P02AZdCgHCnlO5qHQT7BGeFPko4KMXAFf9Hddawffc F9nEC2jDlQ+KXFPTFWIcXnrCE89kQa32QFnks7Tt1RAgG+y2+xJj46LBU/nFeOpJ iu7eLDeKPn4WkmDsLaKIYDtpxXydJhRodnPukQHp4Jxik9HwEwl4L5F4p7bznM6P 6KsihRVrRxfhmHmjm7k43m9u9rNpeey6nrjAKEsZT5wOuNfpgtVAkBrN1fJ4X+tD wEbCeeEXZX1LL2kd8DsUD5Qw4Zs+uaqMqKtuqm9neiEpVOS9/Ktc6hTtt+Cw5l8u XS6NMQZeVl+bTkN6kVzVjSRl2hA5/VWL2Jd9cLjxp3jiIBLpiYZ1Usg8dt0FLgFe 3mQvD7GUMl7nrE4BEF/pwk1tRcEtzZfta5PpqyW2lYX6KXXgwibDND7xv7QXV8GP 2RdFbZC8K+XGCSf/RiD77cH/Uojpto9NnGfnhO3rMeVGnTbUQx57+QEqJLWHfLVQ +tIPRnmepo8=I5j4 -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: For OpenShift Container Platform 4.10 see the following documentation, which will be updated shortly, for detailed release notes: https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html For Red Hat OpenShift Logging 5.4, see the following instructions to apply this update: https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html 4. Bugs fixed (https://bugzilla.redhat.com/): 2100495 - CVE-2021-38561 golang: out-of-bounds read in golang.org/x/text/language leads to DoS 5. JIRA issues fixed (https://issues.jboss.org/): LOG-2536 - Setting up ODF S3 for loki LOG-2640 - [release-5.4] FluentdQueueLengthIncreasing rule failing to be evaluated. LOG-2757 - [release-5.4] index rollover cronjob fails on openshift-logging operator LOG-2762 - [release-5.4]Events and CLO csv are not collected after running `oc adm must-gather --image=$downstream-clo-image ` LOG-2780 - Loki cannot send logs after upgrade to 5.4.3 from 5.4.2 with 'http' LOG-2781 - OpenShift Logging Dashboard for Elastic Shards shows "active_primary" instead of "active" shards. LOG-2786 - [release-5.4] Token not added to Vector config when forwarding logs to Lokistack with Token+CA bundle. LOG-2791 - [release-5.4] ElasticSearch operator does not respect referencePolicy when selecting oauth-proxy image 6. ========================================================================== Ubuntu Security Notice USN-5613-2 September 19, 2022 vim regression ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 20.04 LTS Summary: USN-5613-1 caused a regression in Vim. Software Description: - vim: Vi IMproved - enhanced vi editor Details: USN-5613-1 fixed vulnerabilities in Vim. Unfortunately that update failed to include binary packages for some architectures. This update fixes that regression. We apologize for the inconvenience. Original advisory details: It was discovered that Vim was not properly performing bounds checks when executing spell suggestion commands. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-0943) It was discovered that Vim was using freed memory when dealing with regular expressions through its old regular expression engine. If a user were tricked into opening a specially crafted file, an attacker could crash the application, leading to a denial of service, or possibly achieve code execution. (CVE-2022-1154) It was discovered that Vim was not properly performing checks on name of lambda functions. An attacker could possibly use this issue to cause a denial of service. This issue affected only Ubuntu 22.04 LTS. (CVE-2022-1420) It was discovered that Vim was incorrectly performing bounds checks when processing invalid commands with composing characters in Ex mode. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-1616) It was discovered that Vim was not properly processing latin1 data when issuing Ex commands. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-1619) It was discovered that Vim was not properly performing memory management when dealing with invalid regular expression patterns in buffers. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-1620) It was discovered that Vim was not properly processing invalid bytes when performing spell check operations. An attacker could possibly use this issue to cause a denial of service or execute arbitrary code. (CVE-2022-1621) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 20.04 LTS: vim 2:8.1.2269-1ubuntu5.9 In general, a standard system update will make all the necessary changes

Trust: 1.62

sources: NVD: CVE-2022-1621 // VULHUB: VHN-419734 // PACKETSTORM: 167666 // PACKETSTORM: 167853 // PACKETSTORM: 167838 // PACKETSTORM: 168395 // PACKETSTORM: 167845 // PACKETSTORM: 167984 // PACKETSTORM: 168420

AFFECTED PRODUCTS

vendor:applemodel:macosscope:ltversion:13.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:35

Trust: 1.0

vendor:vimmodel:vimscope:ltversion:8.2.4919

Trust: 1.0

vendor:fedoraprojectmodel:fedorascope:eqversion:34

Trust: 1.0

sources: NVD: CVE-2022-1621

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2022-1621
value: HIGH

Trust: 1.0

security@huntr.dev: CVE-2022-1621
value: HIGH

Trust: 1.0

CNNVD: CNNVD-202205-2826
value: HIGH

Trust: 0.6

VULHUB: VHN-419734
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2022-1621
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-419734
severity: MEDIUM
baseScore: 6.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 8.6
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2022-1621
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

security@huntr.dev: CVE-2022-1621
baseSeverity: HIGH
baseScore: 7.3
vectorString: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.5
version: 3.0

Trust: 1.0

sources: VULHUB: VHN-419734 // CNNVD: CNNVD-202205-2826 // NVD: CVE-2022-1621 // NVD: CVE-2022-1621

PROBLEMTYPE DATA

problemtype:CWE-787

Trust: 1.1

problemtype:CWE-122

Trust: 1.0

sources: VULHUB: VHN-419734 // NVD: CVE-2022-1621

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202205-2826

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202205-2826

PATCH

title:Vim Buffer error vulnerability fixurl:http://123.124.177.30/web/xxk/bdxqById.tag?id=193122

Trust: 0.6

sources: CNNVD: CNNVD-202205-2826

EXTERNAL IDS

db:NVDid:CVE-2022-1621

Trust: 2.4

db:PACKETSTORMid:167853

Trust: 0.8

db:PACKETSTORMid:168395

Trust: 0.8

db:PACKETSTORMid:168420

Trust: 0.8

db:PACKETSTORMid:167666

Trust: 0.8

db:PACKETSTORMid:167985

Trust: 0.7

db:PACKETSTORMid:167778

Trust: 0.7

db:PACKETSTORMid:167419

Trust: 0.7

db:CS-HELPid:SB2022052018

Trust: 0.6

db:CS-HELPid:SB2022071342

Trust: 0.6

db:CS-HELPid:SB2022072631

Trust: 0.6

db:CS-HELPid:SB2022060635

Trust: 0.6

db:CS-HELPid:SB2022070109

Trust: 0.6

db:CS-HELPid:SB2022070642

Trust: 0.6

db:CS-HELPid:SB2022072127

Trust: 0.6

db:CS-HELPid:SB2022072010

Trust: 0.6

db:AUSCERTid:ESB-2022.2405

Trust: 0.6

db:AUSCERTid:ESB-2022.5300

Trust: 0.6

db:AUSCERTid:ESB-2022.6148

Trust: 0.6

db:AUSCERTid:ESB-2022.4641

Trust: 0.6

db:AUSCERTid:ESB-2022.4601

Trust: 0.6

db:AUSCERTid:ESB-2022.4617

Trust: 0.6

db:AUSCERTid:ESB-2022.3226

Trust: 0.6

db:AUSCERTid:ESB-2022.3821

Trust: 0.6

db:AUSCERTid:ESB-2022.2791

Trust: 0.6

db:AUSCERTid:ESB-2022.3977

Trust: 0.6

db:AUSCERTid:ESB-2022.3554

Trust: 0.6

db:AUSCERTid:ESB-2022.3873

Trust: 0.6

db:AUSCERTid:ESB-2022.3644

Trust: 0.6

db:CNNVDid:CNNVD-202205-2826

Trust: 0.6

db:PACKETSTORMid:167838

Trust: 0.2

db:PACKETSTORMid:167845

Trust: 0.2

db:PACKETSTORMid:167984

Trust: 0.2

db:PACKETSTORMid:167644

Trust: 0.1

db:VULHUBid:VHN-419734

Trust: 0.1

sources: VULHUB: VHN-419734 // PACKETSTORM: 167666 // PACKETSTORM: 167853 // PACKETSTORM: 167838 // PACKETSTORM: 168395 // PACKETSTORM: 167845 // PACKETSTORM: 167984 // PACKETSTORM: 168420 // CNNVD: CNNVD-202205-2826 // NVD: CVE-2022-1621

REFERENCES

url:https://support.apple.com/kb/ht213488

Trust: 1.7

url:https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/28

Trust: 1.7

url:http://seclists.org/fulldisclosure/2022/oct/41

Trust: 1.7

url:https://security.gentoo.org/glsa/202208-32

Trust: 1.7

url:https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/05/msg00022.html

Trust: 1.7

url:https://lists.debian.org/debian-lts-announce/2022/11/msg00032.html

Trust: 1.7

url:https://security.gentoo.org/glsa/202305-16

Trust: 1.6

url:https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/hip7kg7tvs5yf3qreay2gogut3yubzai/

Trust: 1.0

url:https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/hip7kg7tvs5yf3qreay2gogut3yubzai/

Trust: 0.7

url:https://nvd.nist.gov/vuln/detail/cve-2022-1621

Trust: 0.7

url:https://www.cybersecurity-help.cz/vdb/sb2022072631

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3977

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2405

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022071342

Trust: 0.6

url:https://packetstormsecurity.com/files/167853/red-hat-security-advisory-2022-5531-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.2791

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.5300

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070109

Trust: 0.6

url:https://packetstormsecurity.com/files/167985/red-hat-security-advisory-2022-5909-01.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022052018

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3226

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3644

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3821

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022072127

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4617

Trust: 0.6

url:https://vigilance.fr/vulnerability/vim-buffer-overflow-via-in-vim-strncpy-find-word-38384

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070642

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb20220720108

Trust: 0.6

url:https://packetstormsecurity.com/files/167666/red-hat-security-advisory-2022-5242-01.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167419/ubuntu-security-notice-usn-5460-1.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022060635

Trust: 0.6

url:https://cxsecurity.com/cveshow/cve-2022-1621/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.6148

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4641

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3554

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.3873

Trust: 0.6

url:https://packetstormsecurity.com/files/168395/ubuntu-security-notice-usn-5613-1.html

Trust: 0.6

url:https://packetstormsecurity.com/files/168420/ubuntu-security-notice-usn-5613-2.html

Trust: 0.6

url:https://packetstormsecurity.com/files/167778/red-hat-security-advisory-2022-5673-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.4601

Trust: 0.6

url:https://access.redhat.com/security/cve/cve-2022-1621

Trust: 0.5

url:https://access.redhat.com/security/team/contact/

Trust: 0.5

url:https://nvd.nist.gov/vuln/detail/cve-2022-1629

Trust: 0.5

url:https://bugzilla.redhat.com/):

Trust: 0.5

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#moderate

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-1629

Trust: 0.5

url:https://access.redhat.com/security/cve/cve-2022-25314

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-27774

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-27782

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-22576

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-27776

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-22576

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-40528

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-25313

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-27774

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-25314

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-40528

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-25313

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2022-29824

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2022-1154

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-0943

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1420

Trust: 0.3

url:https://access.redhat.com/security/cve/cve-2022-1271

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-1271

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-27782

Trust: 0.3

url:https://nvd.nist.gov/vuln/detail/cve-2022-27776

Trust: 0.3

url:https://access.redhat.com/articles/11258

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-27666

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2020-28915

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-28915

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2022-27666

Trust: 0.2

url:https://issues.jboss.org/):

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-29824

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1619

Trust: 0.2

url:https://ubuntu.com/security/notices/usn-5613-1

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1620

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2022-1616

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-38561

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-38561

Trust: 0.2

url:https://access.redhat.com/errata/rhsa-2022:5242

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-0554

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1154

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0943

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1420

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0554

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3695

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html-single/install/index#installing

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28735

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3696

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3696

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5531

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28736

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3695

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3697

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28733

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24450

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28734

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3697

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-28737

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.5/html/release_notes/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-24450

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5704

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-29173

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-29173

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.2.3995-1ubuntu2.1

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.8

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.0.1453-1ubuntu1.9

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-release-notes.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-26691

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5556

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26691

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.10/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5908

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-34169

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21540

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21540

Trust: 0.1

url:https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-21541

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21541

Trust: 0.1

url:https://launchpad.net/ubuntu/+source/vim/2:8.1.2269-1ubuntu5.9

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5613-2

Trust: 0.1

url:https://launchpad.net/bugs/1989973

Trust: 0.1

sources: VULHUB: VHN-419734 // PACKETSTORM: 167666 // PACKETSTORM: 167853 // PACKETSTORM: 167838 // PACKETSTORM: 168395 // PACKETSTORM: 167845 // PACKETSTORM: 167984 // PACKETSTORM: 168420 // CNNVD: CNNVD-202205-2826 // NVD: CVE-2022-1621

CREDITS

Red Hat

Trust: 0.5

sources: PACKETSTORM: 167666 // PACKETSTORM: 167853 // PACKETSTORM: 167838 // PACKETSTORM: 167845 // PACKETSTORM: 167984

SOURCES

db:VULHUBid:VHN-419734
db:PACKETSTORMid:167666
db:PACKETSTORMid:167853
db:PACKETSTORMid:167838
db:PACKETSTORMid:168395
db:PACKETSTORMid:167845
db:PACKETSTORMid:167984
db:PACKETSTORMid:168420
db:CNNVDid:CNNVD-202205-2826
db:NVDid:CVE-2022-1621

LAST UPDATE DATE

2025-10-20T01:41:40.442000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-419734date:2022-11-29T00:00:00
db:CNNVDid:CNNVD-202205-2826date:2023-05-04T00:00:00
db:NVDid:CVE-2022-1621date:2024-11-21T06:41:06.763

SOURCES RELEASE DATE

db:VULHUBid:VHN-419734date:2022-05-10T00:00:00
db:PACKETSTORMid:167666date:2022-07-01T15:00:50
db:PACKETSTORMid:167853date:2022-07-27T17:32:40
db:PACKETSTORMid:167838date:2022-07-27T17:26:20
db:PACKETSTORMid:168395date:2022-09-15T14:21:20
db:PACKETSTORMid:167845date:2022-07-27T17:28:30
db:PACKETSTORMid:167984date:2022-08-05T14:51:51
db:PACKETSTORMid:168420date:2022-09-19T18:26:16
db:CNNVDid:CNNVD-202205-2826date:2022-05-10T00:00:00
db:NVDid:CVE-2022-1621date:2022-05-10T14:15:08.460