Your message dated Wed, 03 Aug 2022 23:35:06 +0000
with message-id <[email protected]>
and subject line Bug#1015984: fixed in vim 2:9.0.0135-1
has caused the Debian Bug report #1015984,
regarding vim: CVE-2022-1942 CVE-2022-1968 CVE-2022-2000 CVE-2022-2124
CVE-2022-2125 CVE-2022-2126 CVE-2022-2129 CVE-2022-2285 CVE-2022-2288
CVE-2022-2304 CVE-2022-2207 CVE-2022-1616 CVE-2022-1619 CVE-2022-1621
CVE-2022-1720 CVE-2022-1785 CVE-2022-1851 CVE-2022-1897 CVE-2022-1898
to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)
--
1015984: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015984
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Source: vim
X-Debbugs-CC: [email protected]
Severity: important
Tags: security
Hi,
The following vulnerabilities were published for vim.
CVE-2022-1942[0]:
| Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/67ca4d3b-9175-43c1-925c-72a7091bc071
https://github.com/vim/vim/commit/71223e2db87c2bf3b09aecb46266b56cda26191d
(v8.2.5043)
CVE-2022-1968[1]:
| Use After Free in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/949090e5-f4ea-4edf-bd79-cd98f0498a5b
https://github.com/vim/vim/commit/409510c588b1eec1ae33511ae97a21eb8e110895
(v8.2.5050)
CVE-2022-2000[2]:
| Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/f61a64e2-d163-461b-a77e-46ab38e021f0
https://github.com/vim/vim/commit/44a3f3353e0407e9fffee138125a6927d1c9e7e5
(v8.2.5063)
CVE-2022-2124[3]:
| Buffer Over-read in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/8e9e056d-f733-4540-98b6-414bf36e0b42
https://github.com/vim/vim/commit/2f074f4685897ab7212e25931eeeb0212292829f
(v8.2.5120)
CVE-2022-2125[4]:
| Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/17dab24d-beec-464d-9a72-5b6b11283705
https://github.com/vim/vim/commit/0e8e938d497260dd57be67b4966cb27a5f72376f
(v8.2.5122)
CVE-2022-2126[5]:
| Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/8d196d9b-3d10-41d2-9f70-8ef0d08c946e
https://github.com/vim/vim/commit/156d3911952d73b03d7420dc3540215247db0fe8
(v8.2.5123)
CVE-2022-2129[6]:
| Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/3aaf06e7-9ae1-454d-b8ca-8709c98e5352
https://github.com/vim/vim/commit/d6211a52ab9f53b82f884561ed43d2fe4d24ff7d
(v8.2.5126)
CVE-2022-2285[7]:
| Integer Overflow or Wraparound in GitHub repository vim/vim prior to
| 9.0.
https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736/
https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
(v9.0.0018)
CVE-2022-2288[8]:
| Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad/
https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
(v9.0.0025)
CVE-2022-2304[9]:
| Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a/
https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
(v9.0.0035)
CVE-2022-2207[10]:
| Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/05bc6051-4dc3-483b-ae56-cf23346b97b9
https://github.com/vim/vim/commit/0971c7a4e537ea120a6bb2195960be8d0815e97b
(v8.2.5162)
CVE-2022-1616[11]:
| Use after free in append_command in GitHub repository vim/vim prior to
| 8.2.4895. This vulnerability is capable of crashing software, Bypass
| Protection Mechanism, Modify Memory, and possible remote execution
https://huntr.dev/bounties/40f1d75f-fb2f-4281-b585-a41017f217e2
https://github.com/vim/vim/commit/d88934406c5375d88f8f1b65331c9f0cab68cc6c
(v8.2.4895)
CVE-2022-1619[12]:
| Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub
| repository vim/vim prior to 8.2.4899. This vulnerabilities are capable
| of crashing software, modify memory, and possible remote execution
https://huntr.dev/bounties/b3200483-624e-4c76-a070-e246f62a7450
https://github.com/vim/vim/commit/ef02f16609ff0a26ffc6e20263523424980898fe
(v8.2.4899)
CVE-2022-1621[13]:
| Heap buffer overflow in vim_strncpy find_word in GitHub repository
| vim/vim prior to 8.2.4919. This vulnerability is capable of crashing
| software, Bypass Protection Mechanism, Modify Memory, and possible
| remote execution
https://huntr.dev/bounties/520ce714-bfd2-4646-9458-f52cd22bb2fb
https://github.com/vim/vim/commit/7c824682d2028432ee082703ef0ab399867a089b
(v8.2.4919)
CVE-2022-1720[14]:
| Buffer Over-read in function grab_file_name in GitHub repository
| vim/vim prior to 8.2.4956. This vulnerability is capable of crashing
| the software, memory modification, and possible remote execution.
https://huntr.dev/bounties/5ccfb386-7eb9-46e5-98e5-243ea4b358a8
https://github.com/vim/vim/commit/395bd1f6d3edc9f7edb5d1f2d7deaf5a9e3ab93c
(v8.2.4956)
CVE-2022-1785[15]:
| Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977.
https://huntr.dev/bounties/8c969cba-eef2-4943-b44a-4e3089599109
https://github.com/vim/vim/commit/e2bd8600b873d2cd1f9d667c28cba8b1dba18839
(v8.2.4977)
CVE-2022-1851[16]:
| Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/f8af901a-9a46-440d-942a-8f815b59394d
https://github.com/vim/vim/commit/78d52883e10d71f23ab72a3d8b9733b00da8c9ad
(v8.2.5013)
CVE-2022-1897[17]:
| Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118
https://github.com/vim/vim/commit/338f1fc0ee3ca929387448fe464579d6113fa76a
(v8.2.5023)
CVE-2022-1898[18]:
| Use After Free in GitHub repository vim/vim prior to 8.2.
https://huntr.dev/bounties/45aad635-c2f1-47ca-a4f9-db5b25979cea
https://github.com/vim/vim/commit/e2fa213cf571041dbd04ab0329303ffdc980678a
(v8.2.5024)
If you fix the vulnerabilities please also make sure to include the
CVE (Common Vulnerabilities & Exposures) ids in your changelog entry.
For further information see:
[0] https://security-tracker.debian.org/tracker/CVE-2022-1942
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1942
[1] https://security-tracker.debian.org/tracker/CVE-2022-1968
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1968
[2] https://security-tracker.debian.org/tracker/CVE-2022-2000
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2000
[3] https://security-tracker.debian.org/tracker/CVE-2022-2124
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2124
[4] https://security-tracker.debian.org/tracker/CVE-2022-2125
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2125
[5] https://security-tracker.debian.org/tracker/CVE-2022-2126
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2126
[6] https://security-tracker.debian.org/tracker/CVE-2022-2129
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2129
[7] https://security-tracker.debian.org/tracker/CVE-2022-2285
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2285
[8] https://security-tracker.debian.org/tracker/CVE-2022-2288
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2288
[9] https://security-tracker.debian.org/tracker/CVE-2022-2304
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2304
[10] https://security-tracker.debian.org/tracker/CVE-2022-2207
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-2207
[11] https://security-tracker.debian.org/tracker/CVE-2022-1616
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1616
[12] https://security-tracker.debian.org/tracker/CVE-2022-1619
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1619
[13] https://security-tracker.debian.org/tracker/CVE-2022-1621
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1621
[14] https://security-tracker.debian.org/tracker/CVE-2022-1720
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1720
[15] https://security-tracker.debian.org/tracker/CVE-2022-1785
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1785
[16] https://security-tracker.debian.org/tracker/CVE-2022-1851
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1851
[17] https://security-tracker.debian.org/tracker/CVE-2022-1897
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1897
[18] https://security-tracker.debian.org/tracker/CVE-2022-1898
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-1898
Please adjust the affected versions in the BTS as needed.
--- End Message ---
--- Begin Message ---
Source: vim
Source-Version: 2:9.0.0135-1
Done: James McCoy <[email protected]>
We believe that the bug you reported is fixed in the latest version of
vim, which is due to be installed in the Debian FTP archive.
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
James McCoy <[email protected]> (supplier of updated vim package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
Format: 1.8
Date: Wed, 03 Aug 2022 19:00:35 -0400
Source: vim
Architecture: source
Version: 2:9.0.0135-1
Distribution: unstable
Urgency: medium
Maintainer: Debian Vim Maintainers <[email protected]>
Changed-By: James McCoy <[email protected]>
Closes: 136455 761800 954016 954113 1010839 1015984 1016068
Changes:
vim (2:9.0.0135-1) unstable; urgency=medium
.
* Merge upstream patch v8.2.5172
+ ftplugin/perl.vim: Only add : to 'isfname' in Perl buffers. (Closes:
#761800)
+ ftplugin/tap.vim: Set fold-related options local to the buffer. (Closes:
#954113)
+ syntax/debcontrol.vim: Fix highlighting of sections with a slash (e.g.,
"non-free/utils"). (Closes: #1010839)
+ syntax/tap.vim: Match TODO/SKIP markers case-insensitively. (Closes:
#954016)
+ syntax/perl.vim: Properly highlight code on the same line as the start
of a here-doc block. (Closes: #136455)
+ Various CVE fixes (Closes: #1015984, #1016068)
- 8.2.5043: can open a cmdline window from a substitute expression,
CVE-2022-1942
- 8.2.5050: using freed memory when searching for pattern in path,
CVE-2022-1968
- 8.2.5063: error for a command may go over the end of IObuff,
CVE-2022-2000
- 8.2.5120: searching for quotes may go over the end of the line,
CVE-2022-2124
- 8.2.5122: lisp indenting may run over the end of the line,
CVE-2022-2125
- 8.2.5123: using invalid index when looking for spell suggestions,
CVE-2022-2126
- 8.2.5126: substitute may overrun destination buffer, CVE-2022-2129
- 9.0.0018: going over the end of the typeahead, CVE-2022-2285
- 9.0.0025: accessing beyond allocated memory with the cmdline window,
CVE-2022-2288
- 9.0.0035: spell dump may go beyond end of an array, CVE-2022-2304
- 8.2.5162: reading before the start of the line with BS in Replace
mode, CVE-2022-2207
- 8.2.4895: buffer overflow with invalid command with composing chars,
CVE-2022-1616
- 8.2.4899: with latin1 encoding CTRL-W might go before the cmdline,
CVE-2022-1619
- 8.2.4919: can add invalid bytes with :spellgood, CVE-2022-1621
- 8.2.4956: reading past end of line with "gf" in Visual block mode,
CVE-2022-1720
- 8.2.4977: memory access error when substitute expression changes
window, CVE-2022-1785
- 8.2.5013: after text formatting cursor may be in an invalid position,
CVE-2022-1851
- 8.2.5023: substitute overwrites allocated buffer, CVE-2022-1897
- 8.2.5024: using freed memory with "]d", CVE-2022-1898
- 9.0.0060: accessing uninitialized memory when completing long line,
CVE-2022-2522
* Temporarily skip Test_Debugger_breakadd_expr
Checksums-Sha1:
c52d67f33d741d9fb5c40a5d803a0bf63000280e 3168 vim_9.0.0135-1.dsc
279eaec7eb3250f1c0d493ecd0e2aca5fb28788f 10917252 vim_9.0.0135.orig.tar.xz
e1d834c7aec33b6b3683cceb248f07e903039475 158664 vim_9.0.0135-1.debian.tar.xz
Checksums-Sha256:
ca02cff05c6ad79f7674fa3fb8327293aaa51dfb3839b9fd17ed0679c09e58ff 3168
vim_9.0.0135-1.dsc
e7ff123fa1d56350cd064cdc54a27ea4b40c5b985fe11e030e764cb70e182999 10917252
vim_9.0.0135.orig.tar.xz
14bebc3605ec3caaa93d449e4f8c7608fc2efe63675506b31c8d43ad67db72ce 158664
vim_9.0.0135-1.debian.tar.xz
Files:
20c365e992b29288f61890f6dd636cc3 3168 editors optional vim_9.0.0135-1.dsc
bcd64eca7d2a54543f895da2abe9972c 10917252 editors optional
vim_9.0.0135.orig.tar.xz
a0ac2b8273dba8fa9b0ecf60ec3f3d8d 158664 editors optional
vim_9.0.0135-1.debian.tar.xz
-----BEGIN PGP SIGNATURE-----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=k3TW
-----END PGP SIGNATURE-----
--- End Message ---