Lucene search

K
slackwareSlackware Linux ProjectSSA-2023-079-02
HistoryMar 20, 2023 - 7:36 p.m.

[slackware-security] vim

2023-03-2019:36:04
Slackware Linux Project
www.slackware.com
22
slackware
security fix
null pointer dereference
buffer size calculation
heap-based buffer overflow
upgrade

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

EPSS

0.001

Percentile

32.6%

New vim packages are available for Slackware 15.0 and -current to
fix security issues.

Here are the details from the Slackware 15.0 ChangeLog:

patches/packages/vim-9.0.1418-i586-1_slack15.0.txz: Upgraded.
Fixed security issues:
NULL pointer dereference issue in utfc_ptr2len.
Incorrect Calculation of Buffer Size.
Heap-based Buffer Overflow.
Thanks to marav for the heads-up.
For more information, see:
https://vulners.com/cve/CVE-2023-1264
https://vulners.com/cve/CVE-2023-1175
https://vulners.com/cve/CVE-2023-1170
(* Security fix *)
patches/packages/vim-gvim-9.0.1418-i586-1_slack15.0.txz: Upgraded.

Where to find the new packages:

Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)

Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.

Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-9.0.1418-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/patches/packages/vim-gvim-9.0.1418-i586-1_slack15.0.txz

Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-9.0.1418-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/patches/packages/vim-gvim-9.0.1418-x86_64-1_slack15.0.txz

Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/ap/vim-9.0.1418-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/xap/vim-gvim-9.0.1418-i586-1.txz

Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/ap/vim-9.0.1418-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/slackware64/xap/vim-gvim-9.0.1418-x86_64-1.txz

MD5 signatures:

Slackware 15.0 packages:
91b0a99dc89adb5e128b60eb91d896f6 vim-9.0.1418-i586-1_slack15.0.txz
8e9f7b4c108745f55a436b1d9f9e0295 vim-gvim-9.0.1418-i586-1_slack15.0.txz

Slackware x86_64 15.0 packages:
491c92d38cb9ff5c2b49c45fc68cf6ad vim-9.0.1418-x86_64-1_slack15.0.txz
56fa8f9a44de7b550dba0496d9a120ee vim-gvim-9.0.1418-x86_64-1_slack15.0.txz

Slackware -current packages:
b844827e42e587e08b02c75ab286ecb5 ap/vim-9.0.1418-i586-1.txz
6c625c6509c875d70aad1be68e064a7b xap/vim-gvim-9.0.1418-i586-1.txz

Slackware x86_64 -current packages:
81f0b239fb8bc75611cd1328af184a59 ap/vim-9.0.1418-x86_64-1.txz
76001e627513c1057fdd6af0714ca11d xap/vim-gvim-9.0.1418-x86_64-1.txz

Installation instructions:

Upgrade the packages as root:
> upgradepkg vim-9.0.1418-i586-1_slack15.0.txz vim-gvim-9.0.1418-i586-1_slack15.0.txz

CVSS3

6.6

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H

EPSS

0.001

Percentile

32.6%