| Summary: | vim new security issue CVE-2022-4141 | ||
|---|---|---|---|
| Product: | Mageia | Reporter: | David Walser <luigiwalser> |
| Component: | Security | Assignee: | QA Team <qa-bugs> |
| Status: | RESOLVED FIXED | QA Contact: | Sec team <security> |
| Severity: | normal | ||
| Priority: | Normal | CC: | andrewsfarm, davidwhodgins, herman.viaene, nicolas.salguero, sysadmin-bugs |
| Version: | 8 | Keywords: | advisory, validated_update |
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | MGA8-64-OK | ||
| Source RPM: | vim-9.0.828-1.mga8.src.rpm | CVE: | CVE-2022-4141 |
| Status comment: | |||
|
Description
David Walser
2022-12-07 18:28:55 CET
David Walser
2022-12-07 18:29:09 CET
Status comment:
(none) =>
Fixed upstream in 9.0.0947 v9.0.963 is in Cauldron, but do not know whether it is relevant. Assigning to tv who looks after vim. Assignee:
bugsquad =>
thierry.vignaud Suggested advisory: ======================== The updated packages fix a security vulnerability: Heap based buffer overflow in vim/vim 9.0.0946 and below by allowing an attacker to CTRL-W gf in the expression used in the RHS of the substitute command. (CVE-2022-4141) References: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-4141 https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/AZ3JMSUCR6Y7626RDWQ2HNSUFIQOJ33G/ ======================== Updated packages in core/updates_testing: ======================== vim-common-9.0.963-1.mga8 vim-enhanced-9.0.963-1.mga8 vim-minimal-9.0.963-1.mga8 vim-X11-9.0.963-1.mga8 from SRPM: vim-9.0.963-1.mga8.src.rpm CC:
(none) =>
nicolas.salguero MGA8-64 MATE on Acer Aspire 5253 No installation issues Muddled around with basic commands as a, d, i, x. Wrote changes to the file and exited OK. Good enough for me. Whiteboard:
(none) =>
MGA8-64-OK Validating. Advisory in comment 2. Keywords:
(none) =>
validated_update
Dave Hodgins
2022-12-13 02:45:30 CET
CC:
(none) =>
davidwhodgins An update for this issue has been pushed to the Mageia Updates repository. https://advisories.mageia.org/MGASA-2022-0464.html Status:
ASSIGNED =>
RESOLVED |