{"schema_version":"1.7.2","id":"OESA-2022-1668","modified":"2022-05-23T11:03:48Z","published":"2022-05-23T11:03:48Z","upstream":["CVE-2022-1619","CVE-2022-1620","CVE-2022-1621","CVE-2022-1629","CVE-2022-1674"],"summary":"vim security update","details":"Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor 'Vi', with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\n\nSecurity Fix(es):\n\nHeap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution.(CVE-2022-1619)\n\nNULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.(CVE-2022-1620)\n\nHeap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution.(CVE-2022-1621)\n\nBuffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution.(CVE-2022-1629)\n\nNULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.(CVE-2022-1674)","affected":[{"package":{"ecosystem":"openEuler:20.03-LTS-SP1","name":"vim","purl":"pkg:rpm/openEuler/vim\u0026distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-27.oe1"}]}],"ecosystem_specific":{"aarch64":["vim-X11-8.2-27.oe1.aarch64.rpm","vim-common-8.2-27.oe1.aarch64.rpm","vim-debuginfo-8.2-27.oe1.aarch64.rpm","vim-debugsource-8.2-27.oe1.aarch64.rpm","vim-enhanced-8.2-27.oe1.aarch64.rpm","vim-minimal-8.2-27.oe1.aarch64.rpm"],"noarch":["vim-filesystem-8.2-27.oe1.noarch.rpm"],"src":["vim-8.2-27.oe1.src.rpm"],"x86_64":["vim-X11-8.2-27.oe1.x86_64.rpm","vim-common-8.2-27.oe1.x86_64.rpm","vim-debuginfo-8.2-27.oe1.x86_64.rpm","vim-debugsource-8.2-27.oe1.x86_64.rpm","vim-enhanced-8.2-27.oe1.x86_64.rpm","vim-minimal-8.2-27.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:20.03-LTS-SP3","name":"vim","purl":"pkg:rpm/openEuler/vim\u0026distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-27.oe1"}]}],"ecosystem_specific":{"aarch64":["vim-X11-8.2-27.oe1.aarch64.rpm","vim-common-8.2-27.oe1.aarch64.rpm","vim-debuginfo-8.2-27.oe1.aarch64.rpm","vim-debugsource-8.2-27.oe1.aarch64.rpm","vim-enhanced-8.2-27.oe1.aarch64.rpm","vim-minimal-8.2-27.oe1.aarch64.rpm"],"noarch":["vim-filesystem-8.2-27.oe1.noarch.rpm"],"src":["vim-8.2-27.oe1.src.rpm"],"x86_64":["vim-X11-8.2-27.oe1.x86_64.rpm","vim-common-8.2-27.oe1.x86_64.rpm","vim-debuginfo-8.2-27.oe1.x86_64.rpm","vim-debugsource-8.2-27.oe1.x86_64.rpm","vim-enhanced-8.2-27.oe1.x86_64.rpm","vim-minimal-8.2-27.oe1.x86_64.rpm"]}},{"package":{"ecosystem":"openEuler:22.03-LTS","name":"vim","purl":"pkg:rpm/openEuler/vim\u0026distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-34.oe2203"}]}],"ecosystem_specific":{"aarch64":["vim-X11-8.2-34.oe2203.aarch64.rpm","vim-common-8.2-34.oe2203.aarch64.rpm","vim-debuginfo-8.2-34.oe2203.aarch64.rpm","vim-debugsource-8.2-34.oe2203.aarch64.rpm","vim-enhanced-8.2-34.oe2203.aarch64.rpm","vim-minimal-8.2-34.oe2203.aarch64.rpm"],"noarch":["vim-filesystem-8.2-34.oe2203.noarch.rpm"],"src":["vim-8.2-34.oe2203.src.rpm"],"x86_64":["vim-X11-8.2-34.oe2203.x86_64.rpm","vim-common-8.2-34.oe2203.x86_64.rpm","vim-debuginfo-8.2-34.oe2203.x86_64.rpm","vim-debugsource-8.2-34.oe2203.x86_64.rpm","vim-enhanced-8.2-34.oe2203.x86_64.rpm","vim-minimal-8.2-34.oe2203.x86_64.rpm"]}}],"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1629"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1674"}],"database_specific":{"severity":"High"}}