Security Vulnerabilities fixed in vim RHSA-2022:0894

description-logoDescription

Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261) vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318) vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359) vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361) vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392) vim: Use after free in src/ex_cmds.c (CVE-2022-0413) vim: Heap-based buffer overflow in block_insert() in src/ops.c (CVE-2022-0261) vim: Heap-based buffer overflow in utf_head_off() in mbyte.c (CVE-2022-0318) vim: Heap-based buffer overflow in init_ccline() in ex_getln.c (CVE-2022-0359) vim: Illegal memory access when copying lines in visual mode leads to heap buffer overflow (CVE-2022-0361) vim: Heap-based buffer overflow in getexmodeline() in ex_getln.c (CVE-2022-0392) vim: Use after free in src/ex_cmds.c (CVE-2022-0413) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. SolutionFor details on how to apply this update, which includes the changes described in this advisory, refer to:https://access.redhat.com/articles/11258

affected-products-logoAffected Applications

vim