Fedora Linux 8776 Published by

A vim security update has been released for Fedora 35.



SECURITY: Fedora 35 Update: vim-8.2.4701-1.fc35


--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-d776fcfe60
2022-04-08 20:28:39.820268
--------------------------------------------------------------------------------

Name : vim
Product : Fedora 35
Version : 8.2.4701
Release : 1.fc35
URL :   http://www.vim.org/
Summary : The VIM editor
Description :
VIM (VIsual editor iMproved) is an updated and improved version of the
vi editor. Vi was the first real screen-based editor for UNIX, and is
still very popular. VIM improves on vi by adding new features:
multiple windows, multi-level undo, block highlighting and more.

--------------------------------------------------------------------------------
Update Information:

The newest upstream commit Security fix for CVE-2022-1160 Security fix for
CVE-2022-1154
--------------------------------------------------------------------------------
ChangeLog:

* Thu Apr 7 2022 Zdenek Dohnal - 2:8.2.4701-1
- patchlevel 4701
--------------------------------------------------------------------------------
References:

[ 1 ] Bug #2070437 - CVE-2022-1160 vim: heap buffer overflow in get_one_sourceline
  https://bugzilla.redhat.com/show_bug.cgi?id=2070437
[ 2 ] Bug #2073013 - CVE-2022-1154 vim: use after free in utf_ptr2char
  https://bugzilla.redhat.com/show_bug.cgi?id=2073013
--------------------------------------------------------------------------------

This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-d776fcfe60' at the command
line. For more information, refer to the dnf documentation available at
  http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
  https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________