<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE1-SA-2023-0072</id>
    <title>An update for vim is now available for HCE 1.1</title>
    <severity>Critical</severity>
    <release>HCE 1.1</release>
    <issued date="2023-01-05 02:56:01"/>
    <updated date="2023-01-05 02:56:01"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629" id="CVE-2022-1629" title="CVE-2022-1629 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3872" id="CVE-2021-3872" title="CVE-2021-3872 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-4193" id="CVE-2021-4193" title="CVE-2021-4193 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069" id="CVE-2021-4069" title="CVE-2021-4069 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-5953" id="CVE-2017-5953" title="CVE-2017-5953 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-6350" id="CVE-2017-6350" title="CVE-2017-6350 Base Score: 9.8 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2125" id="CVE-2022-2125" title="CVE-2022-2125 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0351" id="CVE-2022-0351" title="CVE-2022-0351 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2126" id="CVE-2022-2126" title="CVE-2022-2126 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2017-17087" id="CVE-2017-17087" title="CVE-2017-17087 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2183" id="CVE-2022-2183" title="CVE-2022-2183 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-3974" id="CVE-2021-3974" title="CVE-2021-3974 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution (CVE-2022-1629)

vim is vulnerable to Heap-based Buffer Overflow (CVE-2021-3872)

vim is vulnerable to Out-of-bounds Read (CVE-2021-4193)

vim is vulnerable to Use After Free (CVE-2021-4069)

vim before patch 8.0.0322 does not properly validate values for tree length when handling a spell file, which may result in an integer overflow at a memory allocation site and a resultant buffer overflow. (CVE-2017-5953)

An integer overflow at an unserialize_uep memory allocation site would occur for vim before patch 8.0.0378, if it does not properly validate values for tree length when reading a corrupted undo file, which may lead to resultant buffer overflows. (CVE-2017-6350)

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-2125)

Access of Memory Location Before Start of Buffer in GitHub repository vim/vim prior to 8.2. (CVE-2022-0351)

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-2126)

fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382. (CVE-2017-17087)

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-2183)

vim is vulnerable to Use After Free (CVE-2021-3974)
</description>
    <pkglist>
      <collection short="HCE 1.1" package="vim">
        <name>HCE 1.1</name>
        <package arch="x86_64" name="vim-common" version="7.4.629" release="12.hce1c">
          <filename>vim-common-7.4.629-12.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-enhanced" version="7.4.629" release="12.hce1c">
          <filename>vim-enhanced-7.4.629-12.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-filesystem" version="7.4.629" release="12.hce1c">
          <filename>vim-filesystem-7.4.629-12.hce1c.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-minimal" version="7.4.629" release="12.hce1c">
          <filename>vim-minimal-7.4.629-12.hce1c.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
