[Git][security-tracker-team/security-tracker][master] triage vim CVEs
Helmut Grohne (@helmutg)
helmutg at debian.org
Mon Nov 14 10:51:17 GMT 2022
Helmut Grohne pushed to branch master at Debian Security Tracker / security-tracker
Commits:
01f74ec8 by Helmut Grohne at 2022-11-14T11:48:24+01:00
triage vim CVEs
apo's vim lts upload actually fixed CVE-2021-3872, but he forgot
mentioning it.
Add number of not-affected for buster and sometimes bullseye.
Remove two stretch annotations to avoid conflicts with the ELTS tracker.
- - - - -
2 changed files:
- data/CVE/list
- data/DLA/list
Changes:
=====================================
data/CVE/list
=====================================
@@ -18497,6 +18497,7 @@ CVE-2022-3038 (Use after free in Network Service in Google Chrome prior to 105.0
[buster] - chromium <end-of-life> (see DSA 5046)
CVE-2022-3037 (Use After Free in GitHub repository vim/vim prior to 9.0.0322. ...)
- vim 2:9.0.0626-1 (bug #1019590)
+ [buster] - vim <not-affected> (quickfixtextfunc added in 8.2.0869)
NOTE: https://huntr.dev/bounties/af4c2f2d-d754-4607-b565-9e92f3f717b5
NOTE: https://github.com/vim/vim/commit/4f1b083be43f351bc107541e7b0c9655a5d2c0bb (v9.0.0322)
CVE-2022-3036 (The Gettext override translations WordPress plugin before 2.0.0 does n ...)
@@ -19307,6 +19308,7 @@ CVE-2022-2983
RESERVED
CVE-2022-2982 (Use After Free in GitHub repository vim/vim prior to 9.0.0260. ...)
- vim 2:9.0.0626-1 (bug #1019590)
+ [buster] - vim <not-affected> (quickfixtextfunc added in 8.2.0869)
NOTE: https://huntr.dev/bounties/53f53d9a-ba8a-4985-b7ba-23efbe6833be
NOTE: https://github.com/vim/vim/commit/d6c67629ed05aae436164eec474832daf8ba7420 (v9.0.0260)
CVE-2022-2981 (The Download Monitor WordPress plugin before 4.5.98 does not ensure th ...)
@@ -24133,6 +24135,8 @@ CVE-2022-2581 (Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104
NOTE: Crash in CLI tool, no security impact
CVE-2022-2580 (Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0 ...)
- vim 2:9.0.0135-1
+ [bullseye] - vim <not-affected> (interpolation introduced in 8.2.4930)
+ [buster] - vim <not-affected> (interpolation introduced in 8.2.4930)
NOTE: https://huntr.dev/bounties/c5f2f1d4-0441-4881-b19c-055acaa16249/
NOTE: https://github.com/vim/vim/commit/1e56bda9048a9625bce6e660938c834c5c15b07d (v9.0.0104)
CVE-2022-2579 (A vulnerability, which was classified as problematic, was found in Sou ...)
@@ -29718,6 +29722,8 @@ CVE-2022-2289 (Use After Free in GitHub repository vim/vim prior to 9.0. ...)
NOTE: Crash in CLI tool, no security impact
CVE-2022-2288 (Out-of-bounds Write in GitHub repository vim/vim prior to 9.0. ...)
- vim 2:9.0.0135-1 (bug #1015984)
+ [bullseye] - vim <not-affected> (vulnerable code introduced in 8.2.4763)
+ [buster] - vim <not-affected> (vulnerable code introduced in 8.2.4763)
NOTE: https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad/
NOTE: https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a (v9.0.0025)
CVE-2022-34910
@@ -44910,8 +44916,7 @@ CVE-2022-1421 (The Discy WordPress theme before 5.2 lacks CSRF checks in some AJ
CVE-2022-1420 (Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior ...)
- vim 2:8.2.4793-1
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (Vulnerable code not present)
+ [buster] - vim <not-affected> (method call operator -> introduced in 8.1.1803)
NOTE: https://huntr.dev/bounties/a4323ef8-90ea-4e1c-90e9-c778f0ecf326
NOTE: https://github.com/vim/vim/commit/8b91e71441069b1dde9ac9ff9d9a829b1b4aecca (v8.2.4774)
CVE-2021-46784 (In Squid 3.x through 3.5.28, 4.x through 4.17, and 5.x before 5.6, due ...)
@@ -45374,9 +45379,8 @@ CVE-2022-29404 (In Apache HTTP Server 2.4.53 and earlier, a malicious request to
NOTE: https://github.com/apache/httpd/commit/ce259c4061905bf834f9af51c92456cfe8335ddc
CVE-2022-1381 (global heap buffer overflow in skip_range in GitHub repository vim/vim ...)
- vim 2:8.2.4793-1
- [bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
- [stretch] - vim <not-affected> (Vulnerable code not present)
+ [bullseye] - vim <not-affected> (affects visual range prasing, which was added in 8.2.4633)
+ [buster] - vim <not-affected> (affects visual range prasing, which was added in 8.2.4633)
NOTE: https://huntr.dev/bounties/55f9c0e8-c221-48b6-a00e-bdcaebaba4a4/
NOTE: https://github.com/vim/vim/commit/f50808ed135ab973296bca515ae4029b321afe47 (v8.2.4763)
CVE-2022-29403
@@ -66103,6 +66107,7 @@ CVE-2021-46163 (Kentico Xperience 13.0.44 allows XSS via an XML document to the
NOT-FOR-US: Kentico Xperience CMS
CVE-2022-0156 (vim is vulnerable to Use After Free ...)
- vim 2:8.2.4659-1 (unimportant)
+ [buster] - vim <not-affected> (vim9script functionality not present in buster and earlier)
NOTE: https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
NOTE: https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f (v8.2.4040)
NOTE: Crash in CLI tool, no security impact
@@ -83923,7 +83928,6 @@ CVE-2021-3872 (vim is vulnerable to Heap-based Buffer Overflow ...)
{DLA-2947-1}
- vim 2:8.2.3565-1
[bullseye] - vim <no-dsa> (Minor issue)
- [buster] - vim <no-dsa> (Minor issue)
NOTE: https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
NOTE: https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
CVE-2021-3871
=====================================
data/DLA/list
=====================================
@@ -17,7 +17,7 @@
{CVE-2022-42799 CVE-2022-42823 CVE-2022-42824}
[buster] - webkit2gtk 2.38.2-1~deb10u1
[08 Nov 2022] DLA-3182-1 vim - security update
- {CVE-2021-3927 CVE-2021-3928 CVE-2021-3974 CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4192 CVE-2021-4193 CVE-2022-0213 CVE-2022-0261 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0408 CVE-2022-0413 CVE-2022-0417 CVE-2022-0443 CVE-2022-0554 CVE-2022-0572 CVE-2022-0685 CVE-2022-0714 CVE-2022-0729 CVE-2022-0943 CVE-2022-1154 CVE-2022-1616 CVE-2022-1720 CVE-2022-1851 CVE-2022-1898 CVE-2022-1968 CVE-2022-2285 CVE-2022-2304 CVE-2022-2598 CVE-2022-2946 CVE-2022-3099 CVE-2022-3134 CVE-2022-3234 CVE-2022-3324 CVE-2022-3705}
+ {CVE-2021-3927 CVE-2021-3928 CVE-2021-3974 CVE-2021-3984 CVE-2021-4019 CVE-2021-4069 CVE-2021-4192 CVE-2021-4193 CVE-2022-0213 CVE-2022-0261 CVE-2022-0319 CVE-2022-0351 CVE-2022-0359 CVE-2022-0361 CVE-2022-0368 CVE-2022-0408 CVE-2022-0413 CVE-2022-0417 CVE-2022-0443 CVE-2022-0554 CVE-2022-0572 CVE-2022-0685 CVE-2022-0714 CVE-2022-0729 CVE-2022-0943 CVE-2022-1154 CVE-2022-1616 CVE-2022-1720 CVE-2022-1851 CVE-2022-1898 CVE-2022-1968 CVE-2022-2285 CVE-2022-2304 CVE-2022-2598 CVE-2022-2946 CVE-2022-3099 CVE-2022-3134 CVE-2022-3234 CVE-2022-3324 CVE-2022-3705 CVE-2021-3872}
[buster] - vim 2:8.1.0875-5+deb10u3
[07 Nov 2022] DLA-3181-1 sudo - security update
{CVE-2021-23239}
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/01f74ec833af7b412bcce146998df21eaeb05ee8
--
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/01f74ec833af7b412bcce146998df21eaeb05ee8
You're receiving this email because of your account on salsa.debian.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20221114/e7928a02/attachment-0001.htm>
More information about the debian-security-tracker-commits
mailing list