Updated vim packages fix security vulnerability
Publication date: 09 Jun 2022Modification date: 09 Jun 2022
Type: security
Affected Mageia releases : 8
CVE: CVE-2022-1851 , CVE-2022-1886 , CVE-2022-1897 , CVE-2022-1898 , CVE-2022-1927 , CVE-2022-1942
Description
out-of-bounds read in gchar_cursor() in misc1.c (CVE-2022-1851) use-after-free in find_pattern_in_path() in search.c (CVE-2022-1898) out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897) buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927 ) out of bounds write in vim_regsub_both() (CVE-2022-1942) heap-based buffer overflow in function utf_head_off (CVE-2022-1886)
References
- https://bugs.mageia.org/show_bug.cgi?id=30503
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
SRPMS
8/core
- vim-8.2.5052-1.mga8