[ALSA-2022:5319] Moderate: vim security update
Type:
security
Severity:
moderate
Release date:
2022-08-05
Description:
Vim (Vi IMproved) is an updated and improved version of the vi editor. Security Fix(es): * vim: heap buffer overflow (CVE-2022-1621) * vim: buffer over-read (CVE-2022-1629) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Updated packages listed below:
Architecture Package Checksum
aarch64 vim-minimal-8.0.1763-19.el8_6.2.aarch64.rpm 2aac74c4178cc988093db2fe89cdf49a56980b950177eaee74f64933d3eb4ee9
aarch64 vim-X11-8.0.1763-19.el8_6.2.aarch64.rpm 6a0c9e67cb532ca22cec161669733263f43b667e5ac9f643ede82a577e5a237e
aarch64 vim-common-8.0.1763-19.el8_6.2.aarch64.rpm c4ee3c77909ab2f84248134afc9924f38cc8970320f426ee0db5b029d6c264ae
aarch64 vim-enhanced-8.0.1763-19.el8_6.2.aarch64.rpm e8c35dadec3fd7996467e706852a64e0e0e8eceeea15f7ed64dc57fe8ede53c4
noarch vim-filesystem-8.0.1763-19.el8_6.2.noarch.rpm 056034ec2850b25def174b1eb7edee2833e70c5c6a21e660e3481103a6ec18f7
ppc64le vim-X11-8.0.1763-19.el8_6.2.ppc64le.rpm 2697a11238e95e5c771168cbf6dc5a2ba5eb6f2997550ccb5c24032cbf083867
ppc64le vim-common-8.0.1763-19.el8_6.2.ppc64le.rpm 4d39d2e2a6660e10bee5b374c97f90a5b1629d0a28168b793b09abbb6814b624
ppc64le vim-minimal-8.0.1763-19.el8_6.2.ppc64le.rpm 930103ef3b0d7bc22d0035b940d30816fa10947e43ab9069389395bbc50c76cf
ppc64le vim-enhanced-8.0.1763-19.el8_6.2.ppc64le.rpm ca8685282f236b24c74b0fca8ac0c6847ba6557680ddb33df3cc6f408329f125
x86_64 vim-enhanced-8.0.1763-19.el8_6.2.x86_64.rpm 0ce831321325db6c85dc5773382ff63f434c413c42eb22556d35793904d85626
x86_64 vim-common-8.0.1763-19.el8_6.2.x86_64.rpm 12eb893dd4221fe5ac14d7b9ca133577f351885097d39b0ed273b08052b7c685
x86_64 vim-X11-8.0.1763-19.el8_6.2.x86_64.rpm 71286211ba75850d69b1faf7ef1895231e72c43e8f6a046e0a29fc2e1d6e5e1e
x86_64 vim-minimal-8.0.1763-19.el8_6.2.x86_64.rpm e5df49f82da367d6411f36ef1dc469e51ad74a0fc1fb4fb2c7c052c5d16ab525
Notes:
This page is generated automatically from Red Hat security data and has not been checked for errors. For clarification or corrections please contact the AlmaLinux Packaging Team.