Lucene search

K
slackwareSlackware Linux ProjectSSA-2022-261-01
HistorySep 18, 2022 - 7:06 p.m.

[slackware-security] vim

2022-09-1819:06:51
Slackware Linux Project
www.slackware.com
14

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.7%

New vim packages are available for Slackware 15.0 and -current to
fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/vim-9.0.0500-i586-1_slack15.0.txz: Upgraded.
Fixed heap-based buffer overflow.
Thanks to marav for the heads-up.
For more information, see:
https://vulners.com/cve/CVE-2022-3234
(* Security fix *)
patches/packages/vim-gvim-9.0.0500-i586-1_slack15.0.txz: Upgraded.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-9.0.0500-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-gvim-9.0.0500-i586-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-9.0.0500-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-gvim-9.0.0500-x86_64-1_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/vim-9.0.0500-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/vim-gvim-9.0.0500-i586-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/vim-9.0.0500-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/vim-gvim-9.0.0500-x86_64-1.txz

MD5 signatures:

Slackware 15.0 packages:
2efa206a5f9037288a6dae263635a877 vim-9.0.0500-i586-1_slack15.0.txz
704433332a5cd29b1d8c70e7d6c4b2af vim-gvim-9.0.0500-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
1027b5bbc17d768cfab9be8766d6dd1e vim-9.0.0500-x86_64-1_slack15.0.txz
df6681778959263d69f99f2c26f9d5ac vim-gvim-9.0.0500-x86_64-1_slack15.0.txz

Slackware -current packages:
0e6fe32cbe7f8755e7bc2abe03284fa4 ap/vim-9.0.0500-i586-1.txz
ebcab3ca12832ebc1eb6320e446ac15a xap/vim-gvim-9.0.0500-i586-1.txz

Slackware x86_64 -current packages:
e1fa8afc5b1c749093a390514467f09c ap/vim-9.0.0500-x86_64-1.txz
c30e7ee28421d30ca8914fc50a3373f7 xap/vim-gvim-9.0.0500-x86_64-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg vim-9.0.0500-i586-1_slack15.0.txz vim-gvim-9.0.0500-i586-1_slack15.0.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

39.7%