-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

====================================================================                   Red Hat Security Advisory

Synopsis:          Moderate: vim security update
Advisory ID:       RHSA-2022:0366-01
Product:           Red Hat Enterprise Linux
Advisory URL:      https://access.redhat.com/errata/RHSA-2022:0366
Issue date:        2022-02-01
CVE Names:         CVE-2021-3872 CVE-2021-3984 CVE-2021-4019 
                   CVE-2021-4192 CVE-2021-4193 
====================================================================
1. Summary:

An update for vim is now available for Red Hat Enterprise Linux 8.

Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.

2. Relevant releases/architectures:

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64

3. Description:

Vim (Vi IMproved) is an updated and improved version of the vi editor.

Security Fix(es):

* vim: heap-based buffer overflow in win_redr_status() in drawscreen.c
(CVE-2021-3872)

* vim: illegal memory access in find_start_brace() in cindent.c when
C-indenting (CVE-2021-3984)

* vim: heap-based buffer overflow in find_help_tags() in help.c
(CVE-2021-4019)

* vim: use-after-free in win_linetabsize() (CVE-2021-4192)

* vim: out-of-bound read in getvcol() (CVE-2021-4193)

For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.

4. Solution:

For details on how to apply this update, which includes the changes
described in this advisory, refer to:

https://access.redhat.com/articles/11258

5. Bugs fixed (https://bugzilla.redhat.com/):

2016056 - CVE-2021-3872 vim: heap-based buffer overflow in win_redr_status() in drawscreen.c
2028122 - CVE-2021-3984 vim: illegal memory access in find_start_brace() in cindent.c when C-indenting
2028212 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_tags() in help.c
2039685 - CVE-2021-4192 vim: use-after-free in win_linetabsize()
2039687 - CVE-2021-4193 vim: out-of-bound read in getvcol()

6. Package List:

Red Hat Enterprise Linux AppStream (v. 8):

aarch64:
vim-X11-8.0.1763-16.el8_5.4.aarch64.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-common-8.0.1763-16.el8_5.4.aarch64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-debugsource-8.0.1763-16.el8_5.4.aarch64.rpm
vim-enhanced-8.0.1763-16.el8_5.4.aarch64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm

noarch:
vim-filesystem-8.0.1763-16.el8_5.4.noarch.rpm

ppc64le:
vim-X11-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-common-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-debugsource-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-enhanced-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm

s390x:
vim-X11-8.0.1763-16.el8_5.4.s390x.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-common-8.0.1763-16.el8_5.4.s390x.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-debugsource-8.0.1763-16.el8_5.4.s390x.rpm
vim-enhanced-8.0.1763-16.el8_5.4.s390x.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm

x86_64:
vim-X11-8.0.1763-16.el8_5.4.x86_64.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-common-8.0.1763-16.el8_5.4.x86_64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-debugsource-8.0.1763-16.el8_5.4.x86_64.rpm
vim-enhanced-8.0.1763-16.el8_5.4.x86_64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm

Red Hat Enterprise Linux BaseOS (v. 8):

Source:
vim-8.0.1763-16.el8_5.4.src.rpm

aarch64:
vim-X11-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-debugsource-8.0.1763-16.el8_5.4.aarch64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
vim-minimal-8.0.1763-16.el8_5.4.aarch64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm

ppc64le:
vim-X11-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-debugsource-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-minimal-8.0.1763-16.el8_5.4.ppc64le.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm

s390x:
vim-X11-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-debugsource-8.0.1763-16.el8_5.4.s390x.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
vim-minimal-8.0.1763-16.el8_5.4.s390x.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm

x86_64:
vim-X11-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-debugsource-8.0.1763-16.el8_5.4.x86_64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
vim-minimal-8.0.1763-16.el8_5.4.x86_64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm

These packages are GPG signed by Red Hat for security.  Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/

7. References:

https://access.redhat.com/security/cve/CVE-2021-3872
https://access.redhat.com/security/cve/CVE-2021-3984
https://access.redhat.com/security/cve/CVE-2021-4019
https://access.redhat.com/security/cve/CVE-2021-4192
https://access.redhat.com/security/cve/CVE-2021-4193
https://access.redhat.com/security/updates/classification/#moderate

8. Contact:

The Red Hat security contact is . More contact
details at https://access.redhat.com/security/team/contact/

Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1
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vBC9
-----END PGP SIGNATURE-----

--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce

RedHat: RHSA-2022-0366:06 Moderate: vim security update

An update for vim is now available for Red Hat Enterprise Linux 8

Summary

Vim (Vi IMproved) is an updated and improved version of the vi editor.
Security Fix(es):
* vim: heap-based buffer overflow in win_redr_status() in drawscreen.c (CVE-2021-3872)
* vim: illegal memory access in find_start_brace() in cindent.c when C-indenting (CVE-2021-3984)
* vim: heap-based buffer overflow in find_help_tags() in help.c (CVE-2021-4019)
* vim: use-after-free in win_linetabsize() (CVE-2021-4192)
* vim: out-of-bound read in getvcol() (CVE-2021-4193)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.



Summary


Solution

For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258

References

https://access.redhat.com/security/cve/CVE-2021-3872 https://access.redhat.com/security/cve/CVE-2021-3984 https://access.redhat.com/security/cve/CVE-2021-4019 https://access.redhat.com/security/cve/CVE-2021-4192 https://access.redhat.com/security/cve/CVE-2021-4193 https://access.redhat.com/security/updates/classification/#moderate

Package List

Red Hat Enterprise Linux AppStream (v. 8):
aarch64: vim-X11-8.0.1763-16.el8_5.4.aarch64.rpm vim-X11-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-common-8.0.1763-16.el8_5.4.aarch64.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-debugsource-8.0.1763-16.el8_5.4.aarch64.rpm vim-enhanced-8.0.1763-16.el8_5.4.aarch64.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
noarch: vim-filesystem-8.0.1763-16.el8_5.4.noarch.rpm
ppc64le: vim-X11-8.0.1763-16.el8_5.4.ppc64le.rpm vim-X11-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-common-8.0.1763-16.el8_5.4.ppc64le.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-debugsource-8.0.1763-16.el8_5.4.ppc64le.rpm vim-enhanced-8.0.1763-16.el8_5.4.ppc64le.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
s390x: vim-X11-8.0.1763-16.el8_5.4.s390x.rpm vim-X11-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-common-8.0.1763-16.el8_5.4.s390x.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-debugsource-8.0.1763-16.el8_5.4.s390x.rpm vim-enhanced-8.0.1763-16.el8_5.4.s390x.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
x86_64: vim-X11-8.0.1763-16.el8_5.4.x86_64.rpm vim-X11-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-common-8.0.1763-16.el8_5.4.x86_64.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-debugsource-8.0.1763-16.el8_5.4.x86_64.rpm vim-enhanced-8.0.1763-16.el8_5.4.x86_64.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 8):
Source: vim-8.0.1763-16.el8_5.4.src.rpm
aarch64: vim-X11-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-debugsource-8.0.1763-16.el8_5.4.aarch64.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm vim-minimal-8.0.1763-16.el8_5.4.aarch64.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.aarch64.rpm
ppc64le: vim-X11-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-debugsource-8.0.1763-16.el8_5.4.ppc64le.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm vim-minimal-8.0.1763-16.el8_5.4.ppc64le.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.ppc64le.rpm
s390x: vim-X11-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-debugsource-8.0.1763-16.el8_5.4.s390x.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm vim-minimal-8.0.1763-16.el8_5.4.s390x.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.s390x.rpm
x86_64: vim-X11-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-common-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-debugsource-8.0.1763-16.el8_5.4.x86_64.rpm vim-enhanced-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm vim-minimal-8.0.1763-16.el8_5.4.x86_64.rpm vim-minimal-debuginfo-8.0.1763-16.el8_5.4.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/


Severity
Advisory ID: RHSA-2022:0366-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0366
Issued Date: : 2022-02-01
CVE Names: CVE-2021-3872 CVE-2021-3984 CVE-2021-4019 CVE-2021-4192 CVE-2021-4193

Topic

An update for vim is now available for Red Hat Enterprise Linux 8.Red Hat Product Security has rated this update as having a security impactof Moderate. A Common Vulnerability Scoring System (CVSS) base score, whichgives a detailed severity rating, is available for each vulnerability fromthe CVE link(s) in the References section.


Topic


 

Relevant Releases Architectures

Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64

Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64


Bugs Fixed

2016056 - CVE-2021-3872 vim: heap-based buffer overflow in win_redr_status() in drawscreen.c

2028122 - CVE-2021-3984 vim: illegal memory access in find_start_brace() in cindent.c when C-indenting

2028212 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_tags() in help.c

2039685 - CVE-2021-4192 vim: use-after-free in win_linetabsize()

2039687 - CVE-2021-4193 vim: out-of-bound read in getvcol()


Related News