Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202208-32 ] Vim, gVim: Multiple Vulnerabilitie

    From glsamaker@gentoo.org@21:1/5 to All on Sun Aug 21 04:00:01 2022
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202208-32
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Low
    Title: Vim, gVim: Multiple Vulnerabilities
    Date: August 21, 2022
    Bugs: #811870, #818562, #819528, #823473, #824930, #828583, #829658, #830106, #830994, #833572, #836432, #851231
    ID: 202208-32

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been discovered in Vim, the worst of which
    could result in denial of service.

    Background
    ==========

    Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 app-editors/gvim < 9.0.0060 >= 9.0.0060
    2 app-editors/vim < 9.0.0060 >= 9.0.0060
    3 app-editors/vim-core < 9.0.0060 >= 9.0.0060

    Description
    ===========

    Multiple vulnerabilities have been discovered in Vim and gVim. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Vim users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.0060"

    All gVim users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.0060"

    All vim-core users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.0060"

    References
    ==========

    [ 1 ] CVE-2021-3770
    https://nvd.nist.gov/vuln/detail/CVE-2021-3770
    [ 2 ] CVE-2021-3778
    https://nvd.nist.gov/vuln/detail/CVE-2021-3778
    [ 3 ] CVE-2021-3796
    https://nvd.nist.gov/vuln/detail/CVE-2021-3796
    [ 4 ] CVE-2021-3872
    https://nvd.nist.gov/vuln/detail/CVE-2021-3872
    [ 5 ] CVE-2021-3875
    https://nvd.nist.gov/vuln/detail/CVE-2021-3875
    [ 6 ] CVE-2021-3927
    https://nvd.nist.gov/vuln/detail/CVE-2021-3927
    [ 7 ] CVE-2021-3928
    https://nvd.nist.gov/vuln/detail/CVE-2021-3928
    [ 8 ] CVE-2021-3968
    https://nvd.nist.gov/vuln/detail/CVE-2021-3968
    [ 9 ] CVE-2021-3973
    https://nvd.nist.gov/vuln/detail/CVE-2021-3973
    [ 10 ] CVE-2021-3974
    https://nvd.nist.gov/vuln/detail/CVE-2021-3974
    [ 11 ] CVE-2021-3984
    https://nvd.nist.gov/vuln/detail/CVE-2021-3984
    [ 12 ] CVE-2021-4019
    https://nvd.nist.gov/vuln/detail/CVE-2021-4019
    [ 13 ] CVE-2021-4069
    https://nvd.nist.gov/vuln/detail/CVE-2021-4069
    [ 14 ] CVE-2021-4136
    https://nvd.nist.gov/vuln/detail/CVE-2021-4136
    [ 15 ] CVE-2021-4166
    https://nvd.nist.gov/vuln/detail/CVE-2021-4166
    [ 16 ] CVE-2021-4173
    https://nvd.nist.gov/vuln/detail/CVE-2021-4173
    [ 17 ] CVE-2021-4187
    https://nvd.nist.gov/vuln/detail/CVE-2021-4187
    [ 18 ] CVE-2021-4192
    https://nvd.nist.gov/vuln/detail/CVE-2021-4192
    [ 19 ] CVE-2021-4193
    https://nvd.nist.gov/vuln/detail/CVE-2021-4193
    [ 20 ] CVE-2021-46059
    https://nvd.nist.gov/vuln/detail/CVE-2021-46059
    [ 21 ] CVE-2022-0128
    https://nvd.nist.gov/vuln/detail/CVE-2022-0128
    [ 22 ] CVE-2022-0156
    https://nvd.nist.gov/vuln/detail/CVE-2022-0156
    [ 23 ] CVE-2022-0158
    https://nvd.nist.gov/vuln/detail/CVE-2022-0158
    [ 24 ] CVE-2022-0213
    https://nvd.nist.gov/vuln/detail/CVE-2022-0213
    [ 25 ] CVE-2022-0261
    https://nvd.nist.gov/vuln/detail/CVE-2022-0261
    [ 26 ] CVE-2022-0318
    https://nvd.nist.gov/vuln/detail/CVE-2022-0318
    [ 27 ] CVE-2022-0319
    https://nvd.nist.gov/vuln/detail/CVE-2022-0319
    [ 28 ] CVE-2022-0351
    https://nvd.nist.gov/vuln/detail/CVE-2022-0351
    [ 29 ] CVE-2022-0359
    https://nvd.nist.gov/vuln/detail/CVE-2022-0359
    [ 30 ] CVE-2022-0361
    https://nvd.nist.gov/vuln/detail/CVE-2022-0361
    [ 31 ] CVE-2022-0368
    https://nvd.nist.gov/vuln/detail/CVE-2022-0368
    [ 32 ] CVE-2022-0392
    https://nvd.nist.gov/vuln/detail/CVE-2022-0392
    [ 33 ] CVE-2022-0393
    https://nvd.nist.gov/vuln/detail/CVE-2022-0393
    [ 34 ] CVE-2022-0407
    https://nvd.nist.gov/vuln/detail/CVE-2022-0407
    [ 35 ] CVE-2022-0408
    https://nvd.nist.gov/vuln/detail/CVE-2022-0408
    [ 36 ] CVE-2022-0413
    https://nvd.nist.gov/vuln/detail/CVE-2022-0413
    [ 37 ] CVE-2022-0417
    https://nvd.nist.gov/vuln/detail/CVE-2022-0417
    [ 38 ] CVE-2022-0443
    https://nvd.nist.gov/vuln/detail/CVE-2022-0443
    [ 39 ] CVE-2022-0554
    https://nvd.nist.gov/vuln/detail/CVE-2022-0554
    [ 40 ] CVE-2022-0629
    https://nvd.nist.gov/vuln/detail/CVE-2022-0629
    [ 41 ] CVE-2022-0685
    https://nvd.nist.gov/vuln/detail/CVE-2022-0685
    [ 42 ] CVE-2022-0714
    https://nvd.nist.gov/vuln/detail/CVE-2022-0714
    [ 43 ] CVE-2022-0729
    https://nvd.nist.gov/vuln/detail/CVE-2022-0729
    [ 44 ] CVE-2022-0943
    https://nvd.nist.gov/vuln/detail/CVE-2022-0943
    [ 45 ] CVE-2022-1154
    https://nvd.nist.gov/vuln/detail/CVE-2022-1154
    [ 46 ] CVE-2022-1160
    https://nvd.nist.gov/vuln/detail/CVE-2022-1160
    [ 47 ] CVE-2022-1381
    https://nvd.nist.gov/vuln/detail/CVE-2022-1381
    [ 48 ] CVE-2022-1420
    https://nvd.nist.gov/vuln/detail/CVE-2022-1420
    [ 49 ] CVE-2022-1616
    https://nvd.nist.gov/vuln/detail/CVE-2022-1616
    [ 50 ] CVE-2022-1619
    https://nvd.nist.gov/vuln/detail/CVE-2022-1619
    [ 51 ] CVE-2022-1620
    https://nvd.nist.gov/vuln/detail/CVE-2022-1620
    [ 52 ] CVE-2022-1621
    https://nvd.nist.gov/vuln/detail/CVE-2022-1621
    [ 53 ] CVE-2022-1629
    https://nvd.nist.gov/vuln/detail/CVE-2022-1629
    [ 54 ] CVE-2022-1674
    https://nvd.nist.gov/vuln/detail/CVE-2022-1674
    [ 55 ] CVE-2022-1720
    https://nvd.nist.gov/vuln/detail/CVE-2022-1720
    [ 56 ] CVE-2022-1733
    https://nvd.nist.gov/vuln/detail/CVE-2022-1733
    [ 57 ] CVE-2022-1735
    https://nvd.nist.gov/vuln/detail/CVE-2022-1735
    [ 58 ] CVE-2022-1769
    https://nvd.nist.gov/vuln/detail/CVE-2022-1769
    [ 59 ] CVE-2022-1771
    https://nvd.nist.gov/vuln/detail/CVE-2022-1771
    [ 60 ] CVE-2022-1785
    https://nvd.nist.gov/vuln/detail/CVE-2022-1785
    [ 61 ] CVE-2022-1796
    https://nvd.nist.gov/vuln/detail/CVE-2022-1796
    [ 62 ] CVE-2022-1851
    https://nvd.nist.gov/vuln/detail/CVE-2022-1851
    [ 63 ] CVE-2022-1886
    https://nvd.nist.gov/vuln/detail/CVE-2022-1886
    [ 64 ] CVE-2022-1897
    https://nvd.nist.gov/vuln/detail/CVE-2022-1897
    [ 65 ] CVE-2022-1898
    https://nvd.nist.gov/vuln/detail/CVE-2022-1898
    [ 66 ] CVE-2022-1927
    https://nvd.nist.gov/vuln/detail/CVE-2022-1927
    [ 67 ] CVE-2022-1942
    https://nvd.nist.gov/vuln/detail/CVE-2022-1942
    [ 68 ] CVE-2022-1968
    https://nvd.nist.gov/vuln/detail/CVE-2022-1968
    [ 69 ] CVE-2022-2000
    https://nvd.nist.gov/vuln/detail/CVE-2022-2000
    [ 70 ] CVE-2022-2042
    https://nvd.nist.gov/vuln/detail/CVE-2022-2042
    [ 71 ] CVE-2022-2124
    https://nvd.nist.gov/vuln/detail/CVE-2022-2124
    [ 72 ] CVE-2022-2125
    https://nvd.nist.gov/vuln/detail/CVE-2022-2125
    [ 73 ] CVE-2022-2126
    https://nvd.nist.gov/vuln/detail/CVE-2022-2126
    [ 74 ] CVE-2022-2129
    https://nvd.nist.gov/vuln/detail/CVE-2022-2129
    [ 75 ] CVE-2022-2175
    https://nvd.nist.gov/vuln/detail/CVE-2022-2175
    [ 76 ] CVE-2022-2182
    https://nvd.nist.gov/vuln/detail/CVE-2022-2182
    [ 77 ] CVE-2022-2183
    https://nvd.nist.gov/vuln/detail/CVE-2022-2183
    [ 78 ] CVE-2022-2206
    https://nvd.nist.gov/vuln/detail/CVE-2022-2206
    [ 79 ] CVE-2022-2207
    https://nvd.nist.gov/vuln/detail/CVE-2022-2207
    [ 80 ] CVE-2022-2208
    https://nvd.nist.gov/vuln/detail/CVE-2022-2208
    [ 81 ] CVE-2022-2210
    https://nvd.nist.gov/vuln/detail/CVE-2022-2210
    [ 82 ] CVE-2022-2231
    https://nvd.nist.gov/vuln/detail/CVE-2022-2231
    [ 83 ] CVE-2022-2257
    https://nvd.nist.gov/vuln/detail/CVE-2022-2257
    [ 84 ] CVE-2022-2264
    https://nvd.nist.gov/vuln/detail/CVE-2022-2264
    [ 85 ] CVE-2022-2284
    https://nvd.nist.gov/vuln/detail/CVE-2022-2284
    [ 86 ] CVE-2022-2285
    https://nvd.nist.gov/vuln/detail/CVE-2022-2285
    [ 87 ] CVE-2022-2286
    https://nvd.nist.gov/vuln/detail/CVE-2022-2286
    [ 88 ] CVE-2022-2287
    https://nvd.nist.gov/vuln/detail/CVE-2022-2287
    [ 89 ] CVE-2022-2288
    https://nvd.nist.gov/vuln/detail/CVE-2022-2288
    [ 90 ] CVE-2022-2289
    https://nvd.nist.gov/vuln/detail/CVE-2022-2289
    [ 91 ] CVE-2022-2304
    https://nvd.nist.gov/vuln/detail/CVE-2022-2304
    [ 92 ] CVE-2022-2343
    https://nvd.nist.gov/vuln/detail/CVE-2022-2343
    [ 93 ] CVE-2022-2344
    https://nvd.nist.gov/vuln/detail/CVE-2022-2344
    [ 94 ] CVE-2022-2345
    https://nvd.nist.gov/vuln/detail/CVE-2022-2345

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202208-32

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2022 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmMBi3MACgkQFMQkOaVy +9k7iA/8CyNou6lwS1WHDrESEDlRsaBY1vkZyj/V62GLAnOVvQ17uvC31IpCgfUh 8Z7Eg5xDagX2bZgHYsN6utHAI87e1D+O+1jXArMKkWXZEJWyhVJGSBjN6ZpRTL8K w6rLga6jBwcT50H9+KqhRq9Kx7sgl+IXCfZsVIX3wtejnv8KNPT0Z0szOqMFd3nf 80cdwxKgNfjBIlPlfxbRb7LQuwwajKZtGfDVtmOO4sjhQ0QLW8/UazkaiRLeurkO 0nSRcGCGITJ3JDBLdyrATojkF1JbDJ7qfdeexhfxd5J/MmIHKZw4xuGERjGDpTI1 0xR6pxEFdfnqZG4L4ZYqZ+8Macgpa4VXEtMeGJlqLssvmFlxUJprLruWigLLDw12 JbwZDl5nmAKbP6n/jrvE2hfA5YPSQq0CxHYZidd+AEj2DpzMt42FzDGGRKBYeh7z QHPyksqQ36SX/G0L9WncE5mcVnSTff4slhZTrKA4gBWKIZOCOkQ4M28UWqi9+Srl uXn9dTKw+/zQHbzsYGgaDewgFkEb+IOk2RgGjkjceY8WLji5pJMIsk9bjWLRmdxr 6TZQbi5V26czctHR5le6QQ8ABRhfHimlHvCQ7dMataQ3pQdxiQ6JR56nIbsEC+qU knyVcxLFHeMGiOStqxaamwRGQm3YDcGSKzNnEX/eOvocvS9bq1w=
    =c1TT
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Gretchiie
      Mon Sep 15 05:16:29 2025
      from Derry, Nh via Telnet
    • Fred Blogs
      Mon Sep 15 00:03:12 2025
      from Uk via SSH
    • Plume
      Sun Sep 14 09:34:52 2025
      from Uk via Raw
    • Gretchiie
      Sun Sep 14 06:07:30 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (2 / 14)
    Uptime: 11:35:46
    Calls: 10,387
    Calls today: 2
    Files: 14,060
    Messages: 6,416,701

© >>> Magnum BBS <<<, 2025