SECURITY: Fedora 36 Update: vim-8.2.5172-1.fc36
--------------------------------------------------------------------------------
Fedora Update Notification
FEDORA-2022-719f3ec21b
2022-06-30 01:17:00.409781
--------------------------------------------------------------------------------
Name : vim
Product : Fedora 36
Version : 8.2.5172
Release : 1.fc36
URL : http://www.vim.org/
Summary : The VIM editor
Description :
VIM (VIsual editor iMproved) is an updated and improved version of the
vi editor. Vi was the first real screen-based editor for UNIX, and is
still very popular. VIM improves on vi by adding new features:
multiple windows, multi-level undo, block highlighting and more.
--------------------------------------------------------------------------------
Update Information:
Security fixes for CVE-2022-2124, CVE-2022-2129, CVE-2022-2125, CVE-2022-2126,
CVE-2022-1720, CVE-2022-2175, CVE-2022-2182, CVE-2022-2183, CVE-2022-2231,
CVE-2022-2210, CVE-2022-2208, CVE-2022-2207, CVE-2022-2206
--------------------------------------------------------------------------------
ChangeLog:
* Tue Jun 28 2022 Zdenek Dohnal - 2:8.2.5172-1
- patchlevel 5172
* Tue Jun 21 2022 Zdenek Dohnal - 2:8.2.5141-1
- patchlevel 5141
--------------------------------------------------------------------------------
References:
[ 1 ] Bug #2099558 - CVE-2022-2124 vim: out of bounds read in current_quote()
https://bugzilla.redhat.com/show_bug.cgi?id=2099558
[ 2 ] Bug #2099586 - CVE-2022-2129 vim: out of bounds write in vim_regsub_both()
https://bugzilla.redhat.com/show_bug.cgi?id=2099586
[ 3 ] Bug #2099590 - CVE-2022-2125 vim: out of bounds read in get_lisp_indent()
https://bugzilla.redhat.com/show_bug.cgi?id=2099590
[ 4 ] Bug #2099596 - CVE-2022-2126 vim: out of bounds read in suggest_trie_walk()
https://bugzilla.redhat.com/show_bug.cgi?id=2099596
[ 5 ] Bug #2099979 - CVE-2022-1720 vim: buffer over-read in grab_file_name() in findfile.c
https://bugzilla.redhat.com/show_bug.cgi?id=2099979
[ 6 ] Bug #2101293 - CVE-2022-2175 vim: buffer over-read in put_on_cmdline() at ex_getln.c
https://bugzilla.redhat.com/show_bug.cgi?id=2101293
[ 7 ] Bug #2102153 - CVE-2022-2182 vim: heap-based buffer overflow through parse_cmd_address() in function utf_ptr2char
https://bugzilla.redhat.com/show_bug.cgi?id=2102153
[ 8 ] Bug #2102159 - CVE-2022-2183 vim: out-of-bounds read through get_lisp_indent() in function get_lisp_indent
https://bugzilla.redhat.com/show_bug.cgi?id=2102159
[ 9 ] Bug #2102173 - CVE-2022-2231 vim: null pointer derefernce in function skipwhite may lead to DoS
https://bugzilla.redhat.com/show_bug.cgi?id=2102173
[ 10 ] Bug #2102177 - CVE-2022-2210 vim: out-of-bound write in function ml_append_int
https://bugzilla.redhat.com/show_bug.cgi?id=2102177
[ 11 ] Bug #2102183 - CVE-2022-2208 vim: null pointer dereference in function diff_check
https://bugzilla.redhat.com/show_bug.cgi?id=2102183
[ 12 ] Bug #2102185 - CVE-2022-2207 vim: heap-based buffer overflow in function ins_bs
https://bugzilla.redhat.com/show_bug.cgi?id=2102185
[ 13 ] Bug #2102188 - CVE-2022-2206 vim: out-of-bound read in function msg_outtrans_attr
https://bugzilla.redhat.com/show_bug.cgi?id=2102188
--------------------------------------------------------------------------------
This update can be installed with the "dnf" update program. Use
su -c 'dnf upgrade --advisory FEDORA-2022-719f3ec21b' at the command
line. For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
--------------------------------------------------------------------------------
_______________________________________________
A vim security update has been released for Fedora 36.