Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-297-02
HistoryOct 24, 2023 - 10:27 p.m.

[slackware-security] vim

2023-10-2422:27:40
Slackware Linux Project
www.slackware.com
26
vim package
slackware 15.0
security fix
upgrade
cve-2023-5535
use-after-free
install as root

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.1%

New vim packages are available for Slackware 15.0 and -current to
fix a security issue.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/vim-9.0.2063-i586-1_slack15.0.txz: Upgraded.
Fixed use-after-free security issue.
Thanks to marav for the heads-up.
For more information, see:
https://vulners.com/cve/CVE-2023-5535
(* Security fix *)
patches/packages/vim-gvim-9.0.2063-i586-1_slack15.0.txz: Upgraded.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated package for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-9.0.2063-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-gvim-9.0.2063-i586-1_slack15.0.txz

Updated package for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-9.0.2063-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-gvim-9.0.2063-x86_64-1_slack15.0.txz

Updated package for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/vim-9.0.2063-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/vim-gvim-9.0.2063-i586-1.txz

Updated package for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/vim-9.0.2063-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/vim-gvim-9.0.2063-x86_64-1.txz

MD5 signatures:

Slackware 15.0 packages:
110800073ef654710ff83915795b7e13 vim-9.0.2063-i586-1_slack15.0.txz
f5929a37d1577dbdfd6890c20f34f1be vim-gvim-9.0.2063-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
f8ce49858efe1a4d22782d17e7511855 vim-9.0.2063-x86_64-1_slack15.0.txz
0a9407c9ed59ccae9dad8cea6e183642 vim-gvim-9.0.2063-x86_64-1_slack15.0.txz

Slackware -current packages:
df0ee43cabbaf700a195c45a344b1d7d ap/vim-9.0.2063-i586-1.txz
4ec18c0c7a3c0df1cfb27824cf5cb76d xap/vim-gvim-9.0.2063-i586-1.txz

Slackware x86_64 -current packages:
f008cbf104f16293800d7eea06b930f8 ap/vim-9.0.2063-x86_64-1.txz
a60a96e120edd2c1f73b199ce030b835 xap/vim-gvim-9.0.2063-x86_64-1.txz

Installation instructions:

Upgrade the package as root:
> upgradepkg vim-9.0.2063-i586-1_slack15.0.txz vim-gvim-9.0.2063-i586-1_slack15.0.txz

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

19.1%