Pop-Up Thingie

>>> Magnum BBS <<<
  • Home
  • Forum
  • Files
  • Log in

  1. Forum
  2. Usenet
  3. LINUX.GENTOO.ANNOUNCE
  • [gentoo-announce] [ GLSA 202305-16 ] Vim, gVim: Multiple Vulnerabilitie

    From glsamaker@gentoo.org@21:1/5 to All on Wed May 3 12:20:01 2023
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    Gentoo Linux Security Advisory GLSA 202305-16
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    https://security.gentoo.org/
    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Severity: Low
    Title: Vim, gVim: Multiple Vulnerabilities
    Date: May 03, 2023
    Bugs: #851231, #861092, #869359, #879257, #883681, #889730
    ID: 202305-16

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

    Synopsis
    ========

    Multiple vulnerabilities have been found in Vim, the worst of which
    could result in denial of service.

    Background
    ==========

    Vim is an efficient, highly configurable improved version of the classic ‘vi’ text editor. gVim is the GUI version of Vim.

    Affected packages
    =================

    -------------------------------------------------------------------
    Package / Vulnerable / Unaffected
    -------------------------------------------------------------------
    1 app-editors/gvim < 9.0.1157 >= 9.0.1157
    2 app-editors/vim < 9.0.1157 >= 9.0.1157
    3 app-editors/vim-core < 9.0.1157 >= 9.0.1157

    Description
    ===========

    Multiple vulnerabilities have been discovered in Vim, gVim. Please
    review the CVE identifiers referenced below for details.

    Impact
    ======

    Please review the referenced CVE identifiers for details.

    Workaround
    ==========

    There is no known workaround at this time.

    Resolution
    ==========

    All Vim users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/vim-9.0.1157"

    All gVim users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/gvim-9.0.1157"

    All vim-core users should upgrade to the latest version:

    # emerge --sync
    # emerge --ask --oneshot --verbose ">=app-editors/vim-core-9.0.1157"

    References
    ==========

    [ 1 ] CVE-2022-1154
    https://nvd.nist.gov/vuln/detail/CVE-2022-1154
    [ 2 ] CVE-2022-1160
    https://nvd.nist.gov/vuln/detail/CVE-2022-1160
    [ 3 ] CVE-2022-1381
    https://nvd.nist.gov/vuln/detail/CVE-2022-1381
    [ 4 ] CVE-2022-1420
    https://nvd.nist.gov/vuln/detail/CVE-2022-1420
    [ 5 ] CVE-2022-1616
    https://nvd.nist.gov/vuln/detail/CVE-2022-1616
    [ 6 ] CVE-2022-1619
    https://nvd.nist.gov/vuln/detail/CVE-2022-1619
    [ 7 ] CVE-2022-1620
    https://nvd.nist.gov/vuln/detail/CVE-2022-1620
    [ 8 ] CVE-2022-1621
    https://nvd.nist.gov/vuln/detail/CVE-2022-1621
    [ 9 ] CVE-2022-1629
    https://nvd.nist.gov/vuln/detail/CVE-2022-1629
    [ 10 ] CVE-2022-1674
    https://nvd.nist.gov/vuln/detail/CVE-2022-1674
    [ 11 ] CVE-2022-1720
    https://nvd.nist.gov/vuln/detail/CVE-2022-1720
    [ 12 ] CVE-2022-1725
    https://nvd.nist.gov/vuln/detail/CVE-2022-1725
    [ 13 ] CVE-2022-1733
    https://nvd.nist.gov/vuln/detail/CVE-2022-1733
    [ 14 ] CVE-2022-1735
    https://nvd.nist.gov/vuln/detail/CVE-2022-1735
    [ 15 ] CVE-2022-1769
    https://nvd.nist.gov/vuln/detail/CVE-2022-1769
    [ 16 ] CVE-2022-1771
    https://nvd.nist.gov/vuln/detail/CVE-2022-1771
    [ 17 ] CVE-2022-1785
    https://nvd.nist.gov/vuln/detail/CVE-2022-1785
    [ 18 ] CVE-2022-1796
    https://nvd.nist.gov/vuln/detail/CVE-2022-1796
    [ 19 ] CVE-2022-1851
    https://nvd.nist.gov/vuln/detail/CVE-2022-1851
    [ 20 ] CVE-2022-1886
    https://nvd.nist.gov/vuln/detail/CVE-2022-1886
    [ 21 ] CVE-2022-1897
    https://nvd.nist.gov/vuln/detail/CVE-2022-1897
    [ 22 ] CVE-2022-1898
    https://nvd.nist.gov/vuln/detail/CVE-2022-1898
    [ 23 ] CVE-2022-1927
    https://nvd.nist.gov/vuln/detail/CVE-2022-1927
    [ 24 ] CVE-2022-1942
    https://nvd.nist.gov/vuln/detail/CVE-2022-1942
    [ 25 ] CVE-2022-1968
    https://nvd.nist.gov/vuln/detail/CVE-2022-1968
    [ 26 ] CVE-2022-2000
    https://nvd.nist.gov/vuln/detail/CVE-2022-2000
    [ 27 ] CVE-2022-2042
    https://nvd.nist.gov/vuln/detail/CVE-2022-2042
    [ 28 ] CVE-2022-2124
    https://nvd.nist.gov/vuln/detail/CVE-2022-2124
    [ 29 ] CVE-2022-2125
    https://nvd.nist.gov/vuln/detail/CVE-2022-2125
    [ 30 ] CVE-2022-2126
    https://nvd.nist.gov/vuln/detail/CVE-2022-2126
    [ 31 ] CVE-2022-2129
    https://nvd.nist.gov/vuln/detail/CVE-2022-2129
    [ 32 ] CVE-2022-2175
    https://nvd.nist.gov/vuln/detail/CVE-2022-2175
    [ 33 ] CVE-2022-2182
    https://nvd.nist.gov/vuln/detail/CVE-2022-2182
    [ 34 ] CVE-2022-2183
    https://nvd.nist.gov/vuln/detail/CVE-2022-2183
    [ 35 ] CVE-2022-2206
    https://nvd.nist.gov/vuln/detail/CVE-2022-2206
    [ 36 ] CVE-2022-2207
    https://nvd.nist.gov/vuln/detail/CVE-2022-2207
    [ 37 ] CVE-2022-2208
    https://nvd.nist.gov/vuln/detail/CVE-2022-2208
    [ 38 ] CVE-2022-2210
    https://nvd.nist.gov/vuln/detail/CVE-2022-2210
    [ 39 ] CVE-2022-2231
    https://nvd.nist.gov/vuln/detail/CVE-2022-2231
    [ 40 ] CVE-2022-2257
    https://nvd.nist.gov/vuln/detail/CVE-2022-2257
    [ 41 ] CVE-2022-2264
    https://nvd.nist.gov/vuln/detail/CVE-2022-2264
    [ 42 ] CVE-2022-2284
    https://nvd.nist.gov/vuln/detail/CVE-2022-2284
    [ 43 ] CVE-2022-2285
    https://nvd.nist.gov/vuln/detail/CVE-2022-2285
    [ 44 ] CVE-2022-2286
    https://nvd.nist.gov/vuln/detail/CVE-2022-2286
    [ 45 ] CVE-2022-2287
    https://nvd.nist.gov/vuln/detail/CVE-2022-2287
    [ 46 ] CVE-2022-2288
    https://nvd.nist.gov/vuln/detail/CVE-2022-2288
    [ 47 ] CVE-2022-2289
    https://nvd.nist.gov/vuln/detail/CVE-2022-2289
    [ 48 ] CVE-2022-2304
    https://nvd.nist.gov/vuln/detail/CVE-2022-2304
    [ 49 ] CVE-2022-2343
    https://nvd.nist.gov/vuln/detail/CVE-2022-2343
    [ 50 ] CVE-2022-2344
    https://nvd.nist.gov/vuln/detail/CVE-2022-2344
    [ 51 ] CVE-2022-2345
    https://nvd.nist.gov/vuln/detail/CVE-2022-2345
    [ 52 ] CVE-2022-2522
    https://nvd.nist.gov/vuln/detail/CVE-2022-2522
    [ 53 ] CVE-2022-2816
    https://nvd.nist.gov/vuln/detail/CVE-2022-2816
    [ 54 ] CVE-2022-2817
    https://nvd.nist.gov/vuln/detail/CVE-2022-2817
    [ 55 ] CVE-2022-2819
    https://nvd.nist.gov/vuln/detail/CVE-2022-2819
    [ 56 ] CVE-2022-2845
    https://nvd.nist.gov/vuln/detail/CVE-2022-2845
    [ 57 ] CVE-2022-2849
    https://nvd.nist.gov/vuln/detail/CVE-2022-2849
    [ 58 ] CVE-2022-2862
    https://nvd.nist.gov/vuln/detail/CVE-2022-2862
    [ 59 ] CVE-2022-2874
    https://nvd.nist.gov/vuln/detail/CVE-2022-2874
    [ 60 ] CVE-2022-2889
    https://nvd.nist.gov/vuln/detail/CVE-2022-2889
    [ 61 ] CVE-2022-2923
    https://nvd.nist.gov/vuln/detail/CVE-2022-2923
    [ 62 ] CVE-2022-2946
    https://nvd.nist.gov/vuln/detail/CVE-2022-2946
    [ 63 ] CVE-2022-2980
    https://nvd.nist.gov/vuln/detail/CVE-2022-2980
    [ 64 ] CVE-2022-2982
    https://nvd.nist.gov/vuln/detail/CVE-2022-2982
    [ 65 ] CVE-2022-3016
    https://nvd.nist.gov/vuln/detail/CVE-2022-3016
    [ 66 ] CVE-2022-3099
    https://nvd.nist.gov/vuln/detail/CVE-2022-3099
    [ 67 ] CVE-2022-3134
    https://nvd.nist.gov/vuln/detail/CVE-2022-3134
    [ 68 ] CVE-2022-3153
    https://nvd.nist.gov/vuln/detail/CVE-2022-3153
    [ 69 ] CVE-2022-3234
    https://nvd.nist.gov/vuln/detail/CVE-2022-3234
    [ 70 ] CVE-2022-3235
    https://nvd.nist.gov/vuln/detail/CVE-2022-3235
    [ 71 ] CVE-2022-3256
    https://nvd.nist.gov/vuln/detail/CVE-2022-3256
    [ 72 ] CVE-2022-3278
    https://nvd.nist.gov/vuln/detail/CVE-2022-3278
    [ 73 ] CVE-2022-3296
    https://nvd.nist.gov/vuln/detail/CVE-2022-3296
    [ 74 ] CVE-2022-3297
    https://nvd.nist.gov/vuln/detail/CVE-2022-3297
    [ 75 ] CVE-2022-3324
    https://nvd.nist.gov/vuln/detail/CVE-2022-3324
    [ 76 ] CVE-2022-3352
    https://nvd.nist.gov/vuln/detail/CVE-2022-3352
    [ 77 ] CVE-2022-3491
    https://nvd.nist.gov/vuln/detail/CVE-2022-3491
    [ 78 ] CVE-2022-3520
    https://nvd.nist.gov/vuln/detail/CVE-2022-3520
    [ 79 ] CVE-2022-3591
    https://nvd.nist.gov/vuln/detail/CVE-2022-3591
    [ 80 ] CVE-2022-3705
    https://nvd.nist.gov/vuln/detail/CVE-2022-3705
    [ 81 ] CVE-2022-4141
    https://nvd.nist.gov/vuln/detail/CVE-2022-4141
    [ 82 ] CVE-2022-4292
    https://nvd.nist.gov/vuln/detail/CVE-2022-4292
    [ 83 ] CVE-2022-4293
    https://nvd.nist.gov/vuln/detail/CVE-2022-4293
    [ 84 ] CVE-2022-47024
    https://nvd.nist.gov/vuln/detail/CVE-2022-47024
    [ 85 ] CVE-2023-0049
    https://nvd.nist.gov/vuln/detail/CVE-2023-0049
    [ 86 ] CVE-2023-0051
    https://nvd.nist.gov/vuln/detail/CVE-2023-0051
    [ 87 ] CVE-2023-0054
    https://nvd.nist.gov/vuln/detail/CVE-2023-0054

    Availability
    ============

    This GLSA and any updates to it are available for viewing at
    the Gentoo Security Website:

    https://security.gentoo.org/glsa/202305-16

    Concerns?
    =========

    Security is a primary focus of Gentoo Linux and ensuring the
    confidentiality and security of our users' machines is of utmost
    importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.

    License
    =======

    Copyright 2023 Gentoo Foundation, Inc; referenced text
    belongs to its owner(s).

    The contents of this document are licensed under the
    Creative Commons - Attribution / Share Alike license.

    https://creativecommons.org/licenses/by-sa/2.5
    -----BEGIN PGP SIGNATURE-----

    iQIzBAEBCgAdFiEEpqTA6ABLMxh/aChGFMQkOaVy+9kFAmRSMZEACgkQFMQkOaVy +9nxpg/+MlVygKY4V/AbNJ7gF/7DO01EYbBlNFTN5huseN6OfSzxPY0rTgC+bi6g i38Gf7KyamuUm/su6eldh3lgPj6u8crVN3YrUbhb0FVftU8VuH4N4nwINEBCPTB/ 0qRY7yBtcbgR0752jfwMyU92u709viTcKa+UY0/tERbeYW4WZHM+j7DslUY0+Qnt ye6zC0rX3S/U5JqNpeaPQWJyRLiZyVyF4YnoL2zAk4H4H5HIDtLYVdhR39ZnEgWo E9Q6xTLiB5j7YR1cQyMtX1mFJ0NtVyLArYDuWffp/OX6giCabh/pazydEX+T4Z7Y s8VmSK8jJLcqMhSayILOUy46mapytekgXHlWxBhNZWMWqRD8a8QzODoZXS3G65Rs WcgCnD/10nPe5HkrmgcbNlZ72gRg1ASG2+n4Z3gczFL/ySo7iavaGCh44L2Q83gq KVFwR+Tqg447IIKR/ShskfY2sqGxhW8Y+ylDtTF2QdDviDD9ujA5jcV+GfkG6x6k 2Y+aUC0BVlM6y4Zog0Oj4tEoy4NrrO68g4bkdmMDYm5FZHq+ZlStxAqV+MZHOUaL F3SG1QiQVq+0Pbusujh/Ntk/RIjfr6XZWux8YfRidAsmfs1NRgtckM9vD6y3QSUJ Fc4otybkyxK63wIosl9Fi/m4cZzje4QtVABinrl1ln+i0OTkw5E=
    =RCc+
    -----END PGP SIGNATURE-----

    --- SoupGate-Win32 v1.05
    * Origin: fsxNet Usenet Gateway (21:1/5)
  • Who's Online

  • Recent Visitors

    • Gretchiie
      Sun Sep 14 06:07:30 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 17:11:34 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 17:04:03 2025
      from Rognac, France via Telnet
    • Thlc
      Sat Sep 13 16:32:19 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 15:41:11 2025
      from Rognac, France via SSH
    • Thlc
      Sat Sep 13 07:56:03 2025
      from Rognac, France via SSH
    • Gretchiie
      Sat Sep 13 07:22:10 2025
      from Derry, Nh via Telnet
    • Thlc
      Sat Sep 13 06:57:56 2025
      from Rognac, France via SSH
  • System Info

    Sysop: Keyop
    Location: Huddersfield, West Yorkshire, UK
    Users: 546
    Nodes: 16 (0 / 16)
    Uptime: 157:13:04
    Calls: 10,384
    Calls today: 1
    Files: 14,056
    Messages: 6,416,475

© >>> Magnum BBS <<<, 2025