Mageia 2022-0430: vim security update
Summary
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
(CVE-2022-2000, CVE-2022-2129, CVE-2022-2210)
Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-2042)
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
(CVE-2022-2124, CVE-2022-2175)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
(CVE-2022-2125, CVE-2022-2182, CVE-2022-2207)
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
(CVE-2022-2126, CVE-2022-2183, CVE-2022-2206)
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.
(CVE-2022-2208)
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.
(CVE-2022-2231)
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
(CVE-2022-2257, CVE-2022-2286, CVE-2022-2287, CVE-2022-2288)
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
(CVE-2022-2264, CVE-2022-2284)
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
(CVE-2022-2285)
Use After Fr...
References
- https://bugs.mageia.org/show_bug.cgi?id=30561
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4JJNUS4AEVYSEJMCK6JZB57QHD5V2G4O/
- https://www.debian.org/lts/security/2022/dla-3053
- https://ubuntu.com/security/notices/USN-5492-1
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/GFD2A4YLBR7OIRHTL7CK6YNMEIQ264CN/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/UXPO5EHDV6J4B27E65DOQGZFELUFPRSK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/43Y3VJPOTTY3NTREDIFUPITM2POG4ZLP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/CHFAR6OY6G77M6GXCJT75A4KITLNR6GO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/C72HDIMR3KTTAO7QGTXWUMPBNFUFIBRD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/RY3GEN2Q46ZJKSNHTN2XB6B3VAJBEILN/
- https://lists.suse.com/pipermail/sle-security-updates/2022-September/012199.html
- https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/JUQDO2AKYFBQGJNMY6TUKLRL7L6M3NZB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/XWOJOA7PZZAMBI5GFTL6PWHXMWSDLUXL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/LSSEWQLK55MCNT4Z2IIJEJYEI5HLCODI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/4JCW33NOLMELTTTDJH7WGDIFJZ5YEEMK/
- https://www.debian.org/lts/security/2022/dla-3182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2000
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2042
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2129
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2175
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2182
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2183
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2206
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2208
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2210
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2231
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2257
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2264
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2284
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2286
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2287
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2288
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2289
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2304
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2343
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2344
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2345
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2522
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2571
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2580
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2581
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2598
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2816
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2817
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2819
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2845
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2849
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2862
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2874
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2889
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2923
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2946
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2980
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2982
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3016
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3037
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3099
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3134
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3234
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3235
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3256
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3278
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3296
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3297
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3324
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3352
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3705
Resolution
MGASA-2022-0430 - Updated vim packages fix security vulnerability
SRPMS
- 8/core/vim-9.0.828-1.mga8