Mageia alert MGASA-2021-0481 (vim)
| From: | Mageia Updates <buildsystem-daemon@mageia.org> | |
| To: | updates-announce@ml.mageia.org | |
| Subject: | [updates-announce] MGASA-2021-0481: Updated vim packages fix security vulnerability | |
| Date: | Wed, 20 Oct 2021 23:29:41 +0200 | |
| Message-ID: | <20211020212942.0528E9FB7E@duvel.mageia.org> | |
| Archive-link: | Article | 
MGASA-2021-0481 - Updated vim packages fix security vulnerability Publication date: 20 Oct 2021 URL: https://advisories.mageia.org/MGASA-2021-0481.html Type: security Affected Mageia releases: 8 CVE: CVE-2021-3778, CVE-2021-3796 Description: CVE-2021-3778: vim: Heap-based Buffer Overflow in utf_ptr2char() Fix: patch 8.2.3409: reading beyond end of line with invalid utf-8 character When vim 8.2 is built with --with-features=huge --enable-gui=none and address sanitizer, a heap-buffer overflow occurs when running: echo "Ywp2XTCqCi4KeQpAMA==" | base64 -d > fuzz000.txt vim -u NONE -X -Z -e -s -S fuzz000.txt -c :qa! CVE-2021-3796: vim: Use After Free in nv_replace() Fix: patch 8.2.3428: using freed memory when replacing When vim 8.2 is built with --with-features=huge --enable-gui=none and address sanitizer, a use-after-free occurs when running: LC_ALL=C vim -U NONE -X -Z -e -s -S poc -c :qa! with the poc file provided. References: - https://bugs.mageia.org/show_bug.cgi?id=29501 - https://github.com/vim/vim/commit/65b605665997fad54ef39a9... - https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c... - https://github.com/vim/vim/commit/35a9a00afcb20897d462a76... - https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e... - https://ubuntu.com/security/notices/USN-5093-1 - https://www.openwall.com/lists/oss-security/2021/10/01/1 - https://lists.fedoraproject.org/archives/list/package-ann... - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3778 - https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-3796 SRPMS: - 8/core/vim-8.2.2143-3.2.mga8
           