MGASA-2024-0040

Source
https://advisories.mageia.org/MGASA-2024-0040.html
Import Source
https://advisories.mageia.org/MGASA-2024-0040.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2024-0040
Related
Published
2024-02-17T00:55:07Z
Modified
2024-02-17T00:33:35Z
Summary
Updated vim packages fix a security vulnerability
Details

The updated packages fix a security vulnerability: Vim before 9.0.2142 has a stack-based buffer overflow because didsetlangmap in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. (CVE-2024-22667)

References
Credits

Affected packages

Mageia:9 / vim

Package

Name
vim
Purl
pkg:rpm/mageia/vim?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
9.1.111-1.mga9

Ecosystem specific

{
    "section": "core"
}