ELSA-2022-0366

ELSA-2022-0366 - vim security update

Type:SECURITY
Severity:MODERATE
Release Date:2022-02-03

Description


[8.0.1763-16.0.1.4]
- - Remove upstream references [Orabug: 31197557]

[2:8.0.1763-16.4]
- CVE-2021-4193 vim: vulnerable to Out-of-bounds Read
- CVE-2021-4192 vim: vulnerable to Use After Free

[2:8.0.1763-16.3]
- 2028341 - CVE-2021-3984 vim: illegal memory access when C-indenting could lead to Heap Buffer Overflow [rhel-8.6.0]
- 2028430 - CVE-2021-4019 vim: heap-based buffer overflow in find_help_tags() in src/help.c [rhel-8.6.0]

[2:8.0.1763-16.2]
- remove the upstream test - uses a feature which is not presented in RHEL 8

[2:8.0.1763-16.1]
- CVE-2021-3872 vim: heap-based buffer overflow in win_redr_status() drawscreen.c [rhel-8.6.0]


Related CVEs


CVE-2021-4192
CVE-2021-3872
CVE-2021-3984
CVE-2021-4019
CVE-2021-4193

Updated Packages


Release/ArchitectureFilenameMD5sumSuperseded By Advisory
Oracle Linux 8 (aarch64) vim-8.0.1763-16.0.1.el8_5.4.src.rpm9ce64b755c6bbe7e863d577fde4064f0-
vim-X11-8.0.1763-16.0.1.el8_5.4.aarch64.rpmeda8dc9dd2908597274e52739d10cae1-
vim-common-8.0.1763-16.0.1.el8_5.4.aarch64.rpma253c370140e4f1a884e39f3e3db059a-
vim-enhanced-8.0.1763-16.0.1.el8_5.4.aarch64.rpm83b11f5cfb9c9dbe751e1e2077c6c35e-
vim-filesystem-8.0.1763-16.0.1.el8_5.4.noarch.rpma746feff275e0cea92d7107a51a7122c-
vim-minimal-8.0.1763-16.0.1.el8_5.4.aarch64.rpmfd7de1b6d86124f2d254d36ec4e13db2-
Oracle Linux 8 (x86_64) vim-8.0.1763-16.0.1.el8_5.4.src.rpm9ce64b755c6bbe7e863d577fde4064f0-
vim-X11-8.0.1763-16.0.1.el8_5.4.x86_64.rpm95f31fbdffef4532df86fa3f0318fb1b-
vim-common-8.0.1763-16.0.1.el8_5.4.x86_64.rpm073466222676adff1057c390cc232450-
vim-enhanced-8.0.1763-16.0.1.el8_5.4.x86_64.rpm402b9737316531377b6180bf3056d828-
vim-filesystem-8.0.1763-16.0.1.el8_5.4.noarch.rpma746feff275e0cea92d7107a51a7122c-
vim-minimal-8.0.1763-16.0.1.el8_5.4.x86_64.rpmd234130de1a8172f140cf5891ac5064a-



This page is generated automatically and has not been checked for errors or omissions. For clarification or corrections please contact the Oracle Linux ULN team

software.hardware.complete