MGASA-2021-0481

Source
https://advisories.mageia.org/MGASA-2021-0481.html
Import Source
https://advisories.mageia.org/MGASA-2021-0481.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2021-0481
Related
Published
2021-10-20T21:28:32Z
Modified
2021-10-20T20:57:20Z
Summary
Updated vim packages fix security vulnerability
Details

CVE-2021-3778: vim: Heap-based Buffer Overflow in utf_ptr2char() Fix: patch 8.2.3409: reading beyond end of line with invalid utf-8 character When vim 8.2 is built with --with-features=huge --enable-gui=none and address sanitizer, a heap-buffer overflow occurs when running: echo "Ywp2XTCqCi4KeQpAMA==" | base64 -d > fuzz000.txt vim -u NONE -X -Z -e -s -S fuzz000.txt -c :qa!

CVE-2021-3796: vim: Use After Free in nvreplace() Fix: patch 8.2.3428: using freed memory when replacing When vim 8.2 is built with --with-features=huge --enable-gui=none and address sanitizer, a use-after-free occurs when running: LCALL=C vim -U NONE -X -Z -e -s -S poc -c :qa! with the poc file provided.

References
Credits

Affected packages