MGASA-2022-0223 - Updated vim packages fix security vulnerability

Publication date: 09 Jun 2022
URL: https://advisories.mageia.org/MGASA-2022-0223.html
Type: security
Affected Mageia releases: 8
CVE: CVE-2022-1851,
     CVE-2022-1886,
     CVE-2022-1897,
     CVE-2022-1898,
     CVE-2022-1927,
     CVE-2022-1942

out-of-bounds read in gchar_cursor() in misc1.c (CVE-2022-1851)
use-after-free in find_pattern_in_path() in search.c (CVE-2022-1898)
out-of-bounds write in vim_regsub_both() in regexp.c (CVE-2022-1897)
buffer over-read in utf_ptr2char() in mbyte.c (CVE-2022-1927 )
out of bounds write in vim_regsub_both() (CVE-2022-1942)
heap-based buffer overflow in function utf_head_off (CVE-2022-1886)

References:
- https://bugs.mageia.org/show_bug.cgi?id=30503
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/QMFHBC5OQXDPV2SDYA2JUQGVCPYASTJB/
- https://lists.fedoraproject.org/archives/list/[email protected]/thread/TYNK6SDCMOLQJOI3B4AOE66P2G2IH4ZM/
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1886
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1927
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942

SRPMS:
- 8/core/vim-8.2.5052-1.mga8