SUSE-SU-2017:1712-1: moderate: Security update for vim

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Wed Jun 28 19:09:15 MDT 2017


   SUSE Security Update: Security update for vim
______________________________________________________________________________

Announcement ID:    SUSE-SU-2017:1712-1
Rating:             moderate
References:         #1018870 #1024724 #1027053 #1027057 
Cross-References:   CVE-2017-5953 CVE-2017-6349 CVE-2017-6350
                   
Affected Products:
                    SUSE Linux Enterprise Server for Raspberry Pi 12-SP2
                    SUSE Linux Enterprise Server 12-SP2
                    SUSE Linux Enterprise Desktop 12-SP2
                    OpenStack Cloud Magnum Orchestration 7
______________________________________________________________________________

   An update that solves three vulnerabilities and has one
   errata is now available.

Description:


   This update for vim fixes the following issues:

   Security issues fixed:

   - CVE-2017-5953: Fixed a possible overflow with corrupted spell file
     (bsc#1024724)
   - CVE-2017-6350: Fixed a possible overflow when reading a corrupted undo
     file (bsc#1027053)
   - CVE-2017-6349: Fixed a possible overflow when reading a corrupted undo
     file (bsc#1027057)


   Non security issues fixed:

   - Speed up YAML syntax highlighting (bsc#1018870)


Patch Instructions:

   To install this SUSE Security Update use YaST online_update.
   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2:

      zypper in -t patch SUSE-SLE-RPI-12-SP2-2017-1063=1

   - SUSE Linux Enterprise Server 12-SP2:

      zypper in -t patch SUSE-SLE-SERVER-12-SP2-2017-1063=1

   - SUSE Linux Enterprise Desktop 12-SP2:

      zypper in -t patch SUSE-SLE-DESKTOP-12-SP2-2017-1063=1

   - OpenStack Cloud Magnum Orchestration 7:

      zypper in -t patch SUSE-OpenStack-Cloud-Magnum-Orchestration-7-2017-1063=1

   To bring your system up-to-date, use "zypper patch".


Package List:

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (aarch64):

      gvim-7.4.326-16.1
      gvim-debuginfo-7.4.326-16.1
      vim-7.4.326-16.1
      vim-debuginfo-7.4.326-16.1
      vim-debugsource-7.4.326-16.1

   - SUSE Linux Enterprise Server for Raspberry Pi 12-SP2 (noarch):

      vim-data-7.4.326-16.1

   - SUSE Linux Enterprise Server 12-SP2 (aarch64 ppc64le x86_64):

      gvim-7.4.326-16.1
      gvim-debuginfo-7.4.326-16.1
      vim-7.4.326-16.1
      vim-debuginfo-7.4.326-16.1
      vim-debugsource-7.4.326-16.1

   - SUSE Linux Enterprise Server 12-SP2 (noarch):

      vim-data-7.4.326-16.1

   - SUSE Linux Enterprise Desktop 12-SP2 (x86_64):

      gvim-7.4.326-16.1
      gvim-debuginfo-7.4.326-16.1
      vim-7.4.326-16.1
      vim-debuginfo-7.4.326-16.1
      vim-debugsource-7.4.326-16.1

   - SUSE Linux Enterprise Desktop 12-SP2 (noarch):

      vim-data-7.4.326-16.1

   - OpenStack Cloud Magnum Orchestration 7 (x86_64):

      vim-7.4.326-16.1
      vim-debuginfo-7.4.326-16.1
      vim-debugsource-7.4.326-16.1


References:

   https://www.suse.com/security/cve/CVE-2017-5953.html
   https://www.suse.com/security/cve/CVE-2017-6349.html
   https://www.suse.com/security/cve/CVE-2017-6350.html
   https://bugzilla.suse.com/1018870
   https://bugzilla.suse.com/1024724
   https://bugzilla.suse.com/1027053
   https://bugzilla.suse.com/1027057



More information about the sle-security-updates mailing list