安全公告详情

NS-SA-2025-0081

2025-05-28 09:42:17

简介

moderate: krb5/vim security update

严重级别

moderate

主题

An update for krb5/vim is now available for NewStart CGSL MAIN 7.02.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

krb5:
vim:


Security Fix(es):
krb5: A memory leak flaw was found in krb5 in /krb5/src/lib/gssapi/krb5/k5sealv3.c. This issue can lead to a denial of service through memory exhaustion.(CVE-2024-26461)
krb5: A memory leak flaw was found in krb5 in /krb5/src/kdc/ndr.c. This issue can lead to a denial of service through memory exhaustion.(CVE-2024-26462)
krb5: A vulnerability was found in the MIT Kerberos 5 GSS krb5 wrap token, where an attacker can modify the plaintext Extra Count field, causing the unwrapped token to appear truncated to the application, occurs when the attacker alters the token data during transmission which can lead to improper handling of authentication tokens.(CVE-2024-37371)
krb5: bugfix
vim: A stack-based buffer overflow flaw was found in Vim. The did_set_langmap function in map.c calls sprintf to write to the error buffer that is passed down to the option callback functions. That buffer can be overflown, possibly leading to memory corruption and escalation of privileges.(CVE-2024-22667)
vim: A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.(CVE-2023-48231)
vim: A flaw was found in Vim, an open source command line text editor. In affected versions, when shifting lines in operator pending mode and using a large value, it may be possible to overflow the size of the integer. The impact is low because user interaction is required and a crash may not happen in all situations.(CVE-2023-48237)
vim: A heap use-after-free flaw was found in the vim package. When executing a `:s` command for the first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive `:s` call causes memory to be freed, which may later then be accessed by the initial `:s` command. This issue may result in Vim crashing.(CVE-2023-48706)
vim: A flaw was found in Vim. In silent Ex mode (-s -e), Vim typically doesn't show a screen and operates silently in batch mode, however, it is possible to trigger the function that handles the scrolling of a GUI version of Vim via binary characters. The function that handles the scrolling may trigger a redraw, which will access the ScreenLines pointer and can cause a segmentation fault condition. This may lead to an application crash or other undefined behavior.(CVE-2025-24014)
vim: A flaw was found in Vim's :redir command. This vulnerability allows a use-after-free condition via redirecting the :display command to a clipboard register (* or +), which allows access to freed memory.(CVE-2025-26603)
vim: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 7.02.02B7.

影响组件

  • krb5
  • vim

影响产品

  • CGSL MAIN 7.02

更新包

{"fix":[{"product":"CGSL MAIN 7.02","pkgs":[{"binary":["krb5-devel-1.21.2-1.zncgsl7.9.x86_64.rpm","krb5-libs-1.21.2-1.zncgsl7.9.x86_64.rpm","krb5-libs-core-1.21.2-1.zncgsl7.9.x86_64.rpm","krb5-pkinit-1.21.2-1.zncgsl7.9.x86_64.rpm","krb5-workstation-1.21.2-1.zncgsl7.9.x86_64.rpm","libkadm5-1.21.2-1.zncgsl7.9.x86_64.rpm"],"source":"krb5-1.21.2-1.zncgsl7.9.src.rpm"},{"binary":["vim-common-9.0.2092-5.zncgsl7.3.x86_64.rpm","vim-data-9.0.2092-5.zncgsl7.3.noarch.rpm","vim-enhanced-9.0.2092-5.zncgsl7.3.x86_64.rpm","vim-filesystem-9.0.2092-5.zncgsl7.3.noarch.rpm","vim-minimal-9.0.2092-5.zncgsl7.3.x86_64.rpm"],"source":"vim-9.0.2092-5.zncgsl7.3.src.rpm"}]}]}
CGSL MAIN 7.02
  • krb5-1.21.2-1.zncgsl7.9.src.rpm
    • krb5-devel-1.21.2-1.zncgsl7.9.x86_64.rpm
    • krb5-libs-1.21.2-1.zncgsl7.9.x86_64.rpm
    • krb5-libs-core-1.21.2-1.zncgsl7.9.x86_64.rpm
    • krb5-pkinit-1.21.2-1.zncgsl7.9.x86_64.rpm
    • krb5-workstation-1.21.2-1.zncgsl7.9.x86_64.rpm
    • libkadm5-1.21.2-1.zncgsl7.9.x86_64.rpm
  • vim-9.0.2092-5.zncgsl7.3.src.rpm
    • vim-common-9.0.2092-5.zncgsl7.3.x86_64.rpm
    • vim-data-9.0.2092-5.zncgsl7.3.noarch.rpm
    • vim-enhanced-9.0.2092-5.zncgsl7.3.x86_64.rpm
    • vim-filesystem-9.0.2092-5.zncgsl7.3.noarch.rpm
    • vim-minimal-9.0.2092-5.zncgsl7.3.x86_64.rpm

CVE

参考

© 2004-2023 广东中兴新支点技术有限公司 版权所有 (www.gd-linux.com) 粤ICP备15061780号-2

全国服务热线:400-033-0108