<?xml version="1.0" encoding="utf-8"?>
  <?xml-stylesheet type="text/xsl" href="sa-render.xsl"?>
  <update from="huaweicloud.com" type="security" status="stable" version="1">
    <id>HCE2-SA-2024-0188</id>
    <title>An update for vim is now available for HCE 2.0</title>
    <severity>Important</severity>
    <release>HCE 2.0</release>
    <issued date="2024-06-28 03:57:53"/>
    <updated date="2024-06-28 03:57:53"/>
    <references>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1154" id="CVE-2022-1154" title="CVE-2022-1154 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0943" id="CVE-2022-0943" title="CVE-2022-0943 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1942" id="CVE-2022-1942" title="CVE-2022-1942 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0629" id="CVE-2022-0629" title="CVE-2022-0629 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1629" id="CVE-2022-1629" title="CVE-2022-1629 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-0696" id="CVE-2022-0696" title="CVE-2022-0696 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1785" id="CVE-2022-1785" title="CVE-2022-1785 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1771" id="CVE-2022-1771" title="CVE-2022-1771 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1735" id="CVE-2022-1735" title="CVE-2022-1735 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2042" id="CVE-2022-2042" title="CVE-2022-2042 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1620" id="CVE-2022-1620" title="CVE-2022-1620 Base Score: 7.5 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2021-4069" id="CVE-2021-4069" title="CVE-2021-4069 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1616" id="CVE-2022-1616" title="CVE-2022-1616 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1621" id="CVE-2022-1621" title="CVE-2022-1621 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1898" id="CVE-2022-1898" title="CVE-2022-1898 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1968" id="CVE-2022-1968" title="CVE-2022-1968 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1897" id="CVE-2022-1897" title="CVE-2022-1897 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1796" id="CVE-2022-1796" title="CVE-2022-1796 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-2000" id="CVE-2022-2000" title="CVE-2022-2000 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1720" id="CVE-2022-1720" title="CVE-2022-1720 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1674" id="CVE-2022-1674" title="CVE-2022-1674 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1619" id="CVE-2022-1619" title="CVE-2022-1619 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1851" id="CVE-2022-1851" title="CVE-2022-1851 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1733" id="CVE-2022-1733" title="CVE-2022-1733 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1725" id="CVE-2022-1725" title="CVE-2022-1725 Base Score: 5.5 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H" type="cve"/>
      <reference href="https://nvd.nist.gov/vuln/detail/CVE-2022-1927" id="CVE-2022-1927" title="CVE-2022-1927 Base Score: 7.8 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H" type="cve"/>
    </references>
    <description>Security Fix(es):

Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646. (CVE-2022-1154)

Heap-based Buffer Overflow occurs in vim in GitHub repository vim/vim prior to 8.2.4563. (CVE-2022-0943)

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-1942)

Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. (CVE-2022-0629)

Buffer Over-read in function find_next_quote in GitHub repository vim/vim prior to 8.2.4925. This vulnerabilities are capable of crashing software, Modify Memory, and possible remote execution (CVE-2022-1629)

NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4428. (CVE-2022-0696)

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.4977. (CVE-2022-1785)

Uncontrolled Recursion in GitHub repository vim/vim prior to 8.2.4975. (CVE-2022-1771)

Classic Buffer Overflow in GitHub repository vim/vim prior to 8.2.4969. (CVE-2022-1735)

Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-2042)

NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 in GitHub repository vim/vim prior to 8.2.4901. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2729 allows attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1620)

vim is vulnerable to Use After Free (CVE-2021-4069)

Use after free in append_command in GitHub repository vim/vim prior to 8.2.4895. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1616)

Heap buffer overflow in vim_strncpy find_word in GitHub repository vim/vim prior to 8.2.4919. This vulnerability is capable of crashing software, Bypass Protection Mechanism, Modify Memory, and possible remote execution (CVE-2022-1621)

Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-1898)

Use After Free in GitHub repository vim/vim prior to 8.2. (CVE-2022-1968)

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. (CVE-2022-1897)

Use After Free in GitHub repository vim/vim prior to 8.2.4979. (CVE-2022-1796)

Out-of-bounds Write in GitHub repository vim/vim prior to 8.2. (CVE-2022-2000)

Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution. (CVE-2022-1720)

NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 in GitHub repository vim/vim prior to 8.2.4938. NULL Pointer Dereference in function vim_regexec_string at regexp.c:2733 allows attackers to cause a denial of service (application crash) via a crafted input. (CVE-2022-1674)

Heap-based Buffer Overflow in function cmdline_erase_chars in GitHub repository vim/vim prior to 8.2.4899. This vulnerabilities are capable of crashing software, modify memory, and possible remote execution (CVE-2022-1619)

Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1851)

Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.4968. (CVE-2022-1733)

NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.4959. (CVE-2022-1725)

Buffer Over-read in GitHub repository vim/vim prior to 8.2. (CVE-2022-1927)
</description>
    <pkglist>
      <collection short="HCE 2.0" package="vim">
        <name>HCE 2.0</name>
        <package arch="aarch64" name="vim-common" version="9.0" release="1.r25.hce2">
          <filename>vim-common-9.0-1.r25.hce2.aarch64.rpm</filename>
        </package>
        <package arch="aarch64" name="vim-enhanced" version="9.0" release="1.r25.hce2">
          <filename>vim-enhanced-9.0-1.r25.hce2.aarch64.rpm</filename>
        </package>
        <package arch="noarch" name="vim-filesystem" version="9.0" release="1.r25.hce2">
          <filename>vim-filesystem-9.0-1.r25.hce2.noarch.rpm</filename>
        </package>
        <package arch="aarch64" name="vim-minimal" version="9.0" release="1.r25.hce2">
          <filename>vim-minimal-9.0-1.r25.hce2.aarch64.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-common" version="9.0" release="1.r25.hce2">
          <filename>vim-common-9.0-1.r25.hce2.x86_64.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-enhanced" version="9.0" release="1.r25.hce2">
          <filename>vim-enhanced-9.0-1.r25.hce2.x86_64.rpm</filename>
        </package>
        <package arch="noarch" name="vim-filesystem" version="9.0" release="1.r25.hce2">
          <filename>vim-filesystem-9.0-1.r25.hce2.noarch.rpm</filename>
        </package>
        <package arch="x86_64" name="vim-minimal" version="9.0" release="1.r25.hce2">
          <filename>vim-minimal-9.0-1.r25.hce2.x86_64.rpm</filename>
        </package>
      </collection>
    </pkglist>
  </update>
