stable

vim-8.2.4068-1.fc35

FEDORA-2022-20e66c6698 created by zdohnal 4 years ago for Fedora 35

Security fix for CVE-2021-46059, CVE-2022-0158, CVE-2022-0156

How to install

Updates may require up to 24 hours to propagate to mirrors. If the following command doesn't work, please retry later:

sudo dnf upgrade --refresh --advisory=FEDORA-2022-20e66c6698

This update has been submitted for testing by zdohnal.

4 years ago

This update's test gating status has been changed to 'waiting'.

4 years ago

This update's test gating status has been changed to 'failed'.

4 years ago

This update has been pushed to testing.

4 years ago

This update's test gating status has been changed to 'passed'.

4 years ago
User Icon bojan commented & provided feedback 4 years ago
karma

Works.

User Icon ibims commented & provided feedback 4 years ago
karma

looks ok for me so far.

This update can be pushed to stable now if the maintainer wishes

4 years ago
User Icon besser82 commented & provided feedback 4 years ago
karma

Works great! LGTM! =)

This update has been submitted for stable by bodhi.

4 years ago
User Icon imabug provided feedback 4 years ago
karma
karma

This update has been pushed to stable.

4 years ago

Please log in to add feedback.

Metadata
Type
security
Severity
medium
Karma
5
Signed
Content Type
RPM
Test Gating
Autopush Settings
Unstable by Karma
-3
Stable by Karma
3
Stable by Time
14 days
Dates
submitted
4 years ago
in testing
4 years ago
in stable
4 years ago
BZ#2039843 CVE-2022-0156 vim: use-after-free while treating allocated lines in user functions
0
0
BZ#2039845 CVE-2022-0156 vim: vulnerable to Use After Free [fedora-all]
0
0
BZ#2039846 CVE-2022-0158 vim: heap-based read buffer overflow in compile_get_env()
0
0
BZ#2039848 CVE-2022-0158 vim: vulnerable to Heap-based Buffer Overflow [fedora-all]
0
0
BZ#2039850 CVE-2021-46059 vim: NULL pointer dereference vulnerability via the vim_regexec_multi function at regexp.c
0
0
BZ#2039851 CVE-2021-46059 vim: NULL pointer dereference vulnerability via the vim_regexec_multi function at regexp.c may lead to DoS [fedora-all]
0
0

Automated Test Results