{"id":"OESA-2022-1668","summary":"vim security update","details":"Vim is an advanced text editor that seeks to provide the power of the de-facto Unix editor 'Vi', with a more complete feature set. Vim is a highly configurable text editor built to enable efficient text editing. It is an improved version of the vi editor distributed with most UNIX systems.\n\nSecurity Fix(es):\n\nHeap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution.(CVE-2022-1619)\n\nNULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input.(CVE-2022-1620)\n\nHeap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution.(CVE-2022-1621)\n\nBuffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution.(CVE-2022-1629)\n\nNULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input.(CVE-2022-1674)","modified":"2026-03-11T06:19:25.590516Z","published":"2022-05-23T11:03:48Z","upstream":["CVE-2022-1619","CVE-2022-1620","CVE-2022-1621","CVE-2022-1629","CVE-2022-1674"],"database_specific":{"severity":"High"},"references":[{"type":"ADVISORY","url":"https://www.openeuler.org/en/security/safety-bulletin/detail.html?id=openEuler-SA-2022-1668"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1619"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1620"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1621"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1629"},{"type":"ADVISORY","url":"https://nvd.nist.gov/vuln/detail/CVE-2022-1674"}],"affected":[{"package":{"name":"vim","ecosystem":"openEuler:20.03-LTS-SP1","purl":"pkg:rpm/openEuler/vim&distro=openEuler-20.03-LTS-SP1"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-27.oe1"}]}],"ecosystem_specific":{"src":["vim-8.2-27.oe1.src.rpm"],"noarch":["vim-filesystem-8.2-27.oe1.noarch.rpm"],"aarch64":["vim-X11-8.2-27.oe1.aarch64.rpm","vim-common-8.2-27.oe1.aarch64.rpm","vim-debuginfo-8.2-27.oe1.aarch64.rpm","vim-debugsource-8.2-27.oe1.aarch64.rpm","vim-enhanced-8.2-27.oe1.aarch64.rpm","vim-minimal-8.2-27.oe1.aarch64.rpm"],"x86_64":["vim-X11-8.2-27.oe1.x86_64.rpm","vim-common-8.2-27.oe1.x86_64.rpm","vim-debuginfo-8.2-27.oe1.x86_64.rpm","vim-debugsource-8.2-27.oe1.x86_64.rpm","vim-enhanced-8.2-27.oe1.x86_64.rpm","vim-minimal-8.2-27.oe1.x86_64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2022-1668.json"}},{"package":{"name":"vim","ecosystem":"openEuler:20.03-LTS-SP3","purl":"pkg:rpm/openEuler/vim&distro=openEuler-20.03-LTS-SP3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-27.oe1"}]}],"ecosystem_specific":{"src":["vim-8.2-27.oe1.src.rpm"],"noarch":["vim-filesystem-8.2-27.oe1.noarch.rpm"],"aarch64":["vim-X11-8.2-27.oe1.aarch64.rpm","vim-common-8.2-27.oe1.aarch64.rpm","vim-debuginfo-8.2-27.oe1.aarch64.rpm","vim-debugsource-8.2-27.oe1.aarch64.rpm","vim-enhanced-8.2-27.oe1.aarch64.rpm","vim-minimal-8.2-27.oe1.aarch64.rpm"],"x86_64":["vim-X11-8.2-27.oe1.x86_64.rpm","vim-common-8.2-27.oe1.x86_64.rpm","vim-debuginfo-8.2-27.oe1.x86_64.rpm","vim-debugsource-8.2-27.oe1.x86_64.rpm","vim-enhanced-8.2-27.oe1.x86_64.rpm","vim-minimal-8.2-27.oe1.x86_64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2022-1668.json"}},{"package":{"name":"vim","ecosystem":"openEuler:22.03-LTS","purl":"pkg:rpm/openEuler/vim&distro=openEuler-22.03-LTS"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.2-34.oe2203"}]}],"ecosystem_specific":{"src":["vim-8.2-34.oe2203.src.rpm"],"noarch":["vim-filesystem-8.2-34.oe2203.noarch.rpm"],"aarch64":["vim-X11-8.2-34.oe2203.aarch64.rpm","vim-common-8.2-34.oe2203.aarch64.rpm","vim-debuginfo-8.2-34.oe2203.aarch64.rpm","vim-debugsource-8.2-34.oe2203.aarch64.rpm","vim-enhanced-8.2-34.oe2203.aarch64.rpm","vim-minimal-8.2-34.oe2203.aarch64.rpm"],"x86_64":["vim-X11-8.2-34.oe2203.x86_64.rpm","vim-common-8.2-34.oe2203.x86_64.rpm","vim-debuginfo-8.2-34.oe2203.x86_64.rpm","vim-debugsource-8.2-34.oe2203.x86_64.rpm","vim-enhanced-8.2-34.oe2203.x86_64.rpm","vim-minimal-8.2-34.oe2203.x86_64.rpm"]},"database_specific":{"source":"https://repo.openeuler.org/security/data/osv/OESA-2022-1668.json"}}],"schema_version":"1.7.5"}