SUSE-SU-2022:4619-1: moderate: Security update for vim
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Tue Dec 27 08:21:45 UTC 2022
SUSE Security Update: Security update for vim
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:4619-1
Rating: moderate
References: #1070955 #1173256 #1174564 #1176549 #1182324
#1190533 #1190570 #1191770 #1191893 #1192167
#1192478 #1192481 #1192902 #1192903 #1192904
#1193294 #1193298 #1193466 #1193905 #1194093
#1194216 #1194217 #1194388 #1194556 #1194872
#1194885 #1195004 #1195066 #1195126 #1195202
#1195203 #1195332 #1195354 #1195356 #1196361
#1198596 #1198748 #1199331 #1199333 #1199334
#1199651 #1199655 #1199693 #1199745 #1199747
#1199936 #1200010 #1200011 #1200012 #1200270
#1200697 #1200698 #1200700 #1200701 #1200732
#1200884 #1200902 #1200903 #1200904 #1201132
#1201133 #1201134 #1201135 #1201136 #1201150
#1201151 #1201152 #1201153 #1201154 #1201155
#1201249 #1201356 #1201359 #1201363 #1201620
#1201863 #1202046 #1202049 #1202050 #1202051
#1202414 #1202420 #1202421 #1202511 #1202512
#1202515 #1202552 #1202599 #1202687 #1202689
#1202862 #1202962 #1203110 #1203152 #1203155
#1203194 #1203272 #1203508 #1203509 #1203796
#1203797 #1203799 #1203820 #1203924 #1204779
Cross-References: CVE-2009-0316 CVE-2016-1248 CVE-2017-17087
CVE-2017-5953 CVE-2017-6349 CVE-2017-6350
CVE-2021-3778 CVE-2021-3796 CVE-2021-3872
CVE-2021-3875 CVE-2021-3903 CVE-2021-3927
CVE-2021-3928 CVE-2021-3968 CVE-2021-3973
CVE-2021-3974 CVE-2021-3984 CVE-2021-4019
CVE-2021-4069 CVE-2021-4136 CVE-2021-4166
CVE-2021-4192 CVE-2021-4193 CVE-2021-46059
CVE-2022-0128 CVE-2022-0213 CVE-2022-0261
CVE-2022-0318 CVE-2022-0319 CVE-2022-0351
CVE-2022-0359 CVE-2022-0361 CVE-2022-0392
CVE-2022-0407 CVE-2022-0413 CVE-2022-0696
CVE-2022-1381 CVE-2022-1420 CVE-2022-1616
CVE-2022-1619 CVE-2022-1620 CVE-2022-1720
CVE-2022-1733 CVE-2022-1735 CVE-2022-1771
CVE-2022-1785 CVE-2022-1796 CVE-2022-1851
CVE-2022-1897 CVE-2022-1898 CVE-2022-1927
CVE-2022-1968 CVE-2022-2124 CVE-2022-2125
CVE-2022-2126 CVE-2022-2129 CVE-2022-2175
CVE-2022-2182 CVE-2022-2183 CVE-2022-2206
CVE-2022-2207 CVE-2022-2208 CVE-2022-2210
CVE-2022-2231 CVE-2022-2257 CVE-2022-2264
CVE-2022-2284 CVE-2022-2285 CVE-2022-2286
CVE-2022-2287 CVE-2022-2304 CVE-2022-2343
CVE-2022-2344 CVE-2022-2345 CVE-2022-2522
CVE-2022-2571 CVE-2022-2580 CVE-2022-2581
CVE-2022-2598 CVE-2022-2816 CVE-2022-2817
CVE-2022-2819 CVE-2022-2845 CVE-2022-2849
CVE-2022-2862 CVE-2022-2874 CVE-2022-2889
CVE-2022-2923 CVE-2022-2946 CVE-2022-2980
CVE-2022-2982 CVE-2022-3016 CVE-2022-3037
CVE-2022-3099 CVE-2022-3134 CVE-2022-3153
CVE-2022-3234 CVE-2022-3235 CVE-2022-3278
CVE-2022-3296 CVE-2022-3297 CVE-2022-3324
CVE-2022-3352 CVE-2022-3705
CVSS scores:
CVE-2016-1248 (NVD) : 7.8 CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2017-17087 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CVE-2017-17087 (SUSE): 4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
CVE-2017-5953 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-5953 (SUSE): 8.4 CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-6349 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-6350 (NVD) : 9.8 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3778 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
CVE-2021-3796 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3875 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-3875 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3903 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3903 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3928 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CVE-2021-3968 (NVD) : 8 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3973 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3974 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3974 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-4069 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4069 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE-2021-4136 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4136 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4166 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2021-4166 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2021-4192 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4192 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0128 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0128 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-0213 (NVD) : 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-0213 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0261 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0261 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0318 (NVD) : 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0319 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-0359 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0359 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-0392 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0392 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVE-2022-0407 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0407 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0696 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0696 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1381 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1381 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1420 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-1420 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1616 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1616 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1619 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1619 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1620 (NVD) : 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1620 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1720 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1720 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1733 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1733 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-1735 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1735 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1771 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-1771 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1785 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-1785 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1796 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1796 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-1851 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1851 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-1897 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1897 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1898 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1898 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-1927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1927 (SUSE): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
CVE-2022-1968 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-1968 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVE-2022-2124 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2124 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2125 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2125 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2126 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2126 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2129 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2129 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2175 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2175 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2182 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2182 (SUSE): 3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:L
CVE-2022-2183 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2183 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2022-2206 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2206 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:L
CVE-2022-2207 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2207 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2208 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2208 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2210 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2210 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-2231 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2231 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2257 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2257 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2264 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2264 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2284 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2284 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2285 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2285 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVE-2022-2286 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2286 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2287 (NVD) : 7.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H
CVE-2022-2287 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2304 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2304 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-2343 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2343 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2344 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2344 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2345 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2345 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2522 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2522 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2571 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2571 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-2580 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2580 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-2581 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2581 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-2598 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2598 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2816 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2816 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2817 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2817 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2819 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2819 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2845 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2845 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2849 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2849 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2862 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2862 (SUSE): 4.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L
CVE-2022-2874 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2874 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2889 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2889 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2923 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2923 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2946 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2946 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-2980 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-2980 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-2982 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-2982 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3016 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3016 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3037 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3037 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3099 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3099 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-3134 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3134 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3153 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-3153 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-3234 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3235 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3235 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3278 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-3278 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3296 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3296 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-3297 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3297 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-3324 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3324 (SUSE): 7 CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3352 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3352 (SUSE): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
CVE-2022-3705 (NVD) : 7.5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-3705 (SUSE): 5 CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L
Affected Products:
SUSE Linux Enterprise Server 12-SP2-BCL
SUSE Linux Enterprise Server 12-SP3-BCL
SUSE Linux Enterprise Server 12-SP4-LTSS
SUSE Linux Enterprise Server 12-SP5
SUSE Linux Enterprise Server for SAP 12-SP4
SUSE OpenStack Cloud 9
SUSE OpenStack Cloud Crowbar 9
______________________________________________________________________________
An update that solves 104 vulnerabilities and has one
errata is now available.
Description:
This update for vim fixes the following issues:
Updated to version 9.0.0814:
* Fixing bsc#1192478 VUL-1: CVE-2021-3928: vim: vim is vulnerable to
Stack-based Buffer Overflow
* Fixing bsc#1203508 VUL-0: CVE-2022-3234: vim: Heap-based Buffer
Overflow prior to 9.0.0483.
* Fixing bsc#1203509 VUL-1: CVE-2022-3235: vim: Use After Free in GitHub
prior to 9.0.0490.
* Fixing bsc#1203820 VUL-0: CVE-2022-3324: vim: Stack-based Buffer
Overflow in prior to 9.0.0598.
* Fixing bsc#1204779 VUL-0: CVE-2022-3705: vim: use after free in
function qf_update_buffer of the file quickfix.c
* Fixing bsc#1203152 VUL-1: CVE-2022-2982: vim: use after free in
qf_fill_buffer()
* Fixing bsc#1203796 VUL-1: CVE-2022-3296: vim: stack out of bounds read
in ex_finally() in ex_eval.c
* Fixing bsc#1203797 VUL-1: CVE-2022-3297: vim: use-after-free in
process_next_cpt_value() at insexpand.c
* Fixing bsc#1203110 VUL-1: CVE-2022-3099: vim: Use After Free in
ex_docmd.c
* Fixing bsc#1203194 VUL-1: CVE-2022-3134: vim: use after free in
do_tag()
* Fixing bsc#1203272 VUL-1: CVE-2022-3153: vim: NULL Pointer Dereference
in GitHub repository vim/vim prior to 9.0.0404.
* Fixing bsc#1203799 VUL-1: CVE-2022-3278: vim: NULL pointer dereference
in eval_next_non_blank() in eval.c
* Fixing bsc#1203924 VUL-1: CVE-2022-3352: vim: vim: use after free
* Fixing bsc#1203155 VUL-1: CVE-2022-2980: vim: null pointer dereference
in do_mouse()
* Fixing bsc#1202962 VUL-1: CVE-2022-3037: vim: Use After Free in vim
prior to 9.0.0321
* Fixing bsc#1200884 Vim: Error on startup
* Fixing bsc#1200902 VUL-0: CVE-2022-2183: vim: Out-of-bounds Read
through get_lisp_indent() Mon 13:32
* Fixing bsc#1200903 VUL-0: CVE-2022-2182: vim: Heap-based Buffer
Overflow through parse_cmd_address() Tue 08:37
* Fixing bsc#1200904 VUL-0: CVE-2022-2175: vim: Buffer Over-read through
cmdline_insert_reg() Tue 08:37
* Fixing bsc#1201249 VUL-0: CVE-2022-2304: vim: stack buffer overflow in
spell_dump_compl()
* Fixing bsc#1201356 VUL-1: CVE-2022-2343: vim: Heap-based Buffer
Overflow in GitHub repository vim prior to 9.0.0044
* Fixing bsc#1201359 VUL-1: CVE-2022-2344: vim: Another Heap-based
Buffer Overflow vim prior to 9.0.0045
* Fixing bsc#1201363 VUL-1: CVE-2022-2345: vim: Use After Free in GitHub
repository vim prior to 9.0.0046.
* Fixing bsc#1201620 vim: SLE-15-SP4-Full-x86_64-GM-Media1 and
vim-plugin-tlib-1.27-bp154.2.18.noarch issue
* Fixing bsc#1202414 VUL-1: CVE-2022-2819: vim: Heap-based Buffer
Overflow in compile_lock_unlock()
* Fixing bsc#1202552 VUL-1: CVE-2022-2874: vim: NULL Pointer Dereference
in generate_loadvar()
* Fixing bsc#1200270 VUL-1: CVE-2022-1968: vim: use after free in
utf_ptr2char
* Fixing bsc#1200697 VUL-1: CVE-2022-2124: vim: out of bounds read in
current_quote()
* Fixing bsc#1200698 VUL-1: CVE-2022-2125: vim: out of bounds read in
get_lisp_indent()
* Fixing bsc#1200700 VUL-1: CVE-2022-2126: vim: out of bounds read in
suggest_trie_walk()
* Fixing bsc#1200701 VUL-1: CVE-2022-2129: vim: out of bounds write in
vim_regsub_both()
* Fixing bsc#1200732 VUL-1: CVE-2022-1720: vim: out of bounds read in
grab_file_name()
* Fixing bsc#1201132 VUL-1: CVE-2022-2264: vim: out of bounds read in
inc()
* Fixing bsc#1201133 VUL-1: CVE-2022-2284: vim: out of bounds read in
utfc_ptr2len()
* Fixing bsc#1201134 VUL-1: CVE-2022-2285: vim: negative size passed to
memmove() due to integer overflow
* Fixing bsc#1201135 VUL-1: CVE-2022-2286: vim: out of bounds read in
ins_bytes()
* Fixing bsc#1201136 VUL-1: CVE-2022-2287: vim: out of bounds read in
suggest_trie_walk()
* Fixing bsc#1201150 VUL-1: CVE-2022-2231: vim: null pointer dereference
skipwhite()
* Fixing bsc#1201151 VUL-1: CVE-2022-2210: vim: out of bounds read in
ml_append_int()
* Fixing bsc#1201152 VUL-1: CVE-2022-2208: vim: null pointer dereference
in diff_check()
* Fixing bsc#1201153 VUL-1: CVE-2022-2207: vim: out of bounds read in
ins_bs()
* Fixing bsc#1201154 VUL-1: CVE-2022-2257: vim: out of bounds read in
msg_outtrans_special()
* Fixing bsc#1201155 VUL-1: CVE-2022-2206: vim: out of bounds read in
msg_outtrans_attr()
* Fixing bsc#1201863 VUL-1: CVE-2022-2522: vim: out of bounds read via
nested autocommand
* Fixing bsc#1202046 VUL-1: CVE-2022-2571: vim: Heap-based Buffer
Overflow related to ins_comp_get_next_word_or_line()
* Fixing bsc#1202049 VUL-1: CVE-2022-2580: vim: Heap-based Buffer
Overflow related to eval_string()
* Fixing bsc#1202050 VUL-1: CVE-2022-2581: vim: Out-of-bounds Read
related to cstrchr()
* Fixing bsc#1202051 VUL-1: CVE-2022-2598: vim: Undefined Behavior for
Input to API related to diff_mark_adjust_tp() and ex_diffgetput()
* Fixing bsc#1202420 VUL-1: CVE-2022-2817: vim: Use After Free in
f_assert_fails()
* Fixing bsc#1202421 VUL-1: CVE-2022-2816: vim: Out-of-bounds Read in
check_vim9_unlet()
* Fixing bsc#1202511 VUL-1: CVE-2022-2862: vim: use-after-free in
compile_nested_function()
* Fixing bsc#1202512 VUL-1: CVE-2022-2849: vim: Invalid memory access
related to mb_ptr2len()
* Fixing bsc#1202515 VUL-1: CVE-2022-2845: vim: Buffer Over-read related
to display_dollar()
* Fixing bsc#1202599 VUL-1: CVE-2022-2889: vim: use-after-free in
find_var_also_in_script() in evalvars.c
* Fixing bsc#1202687 VUL-1: CVE-2022-2923: vim: NULL Pointer Dereference
in GitHub repository vim/vim prior to 9.0.0240
* Fixing bsc#1202689 VUL-1: CVE-2022-2946: vim: use after free in
function vim_vsnprintf_typval
* Fixing bsc#1202862 VUL-1: CVE-2022-3016: vim: Use After Free in vim
prior to 9.0.0285 Mon 12:00
* Fixing bsc#1191770 VUL-0: CVE-2021-3875: vim: heap-based buffer
overflow
* Fixing bsc#1192167 VUL-0: CVE-2021-3903: vim: heap-based buffer
overflow
* Fixing bsc#1192902 VUL-0: CVE-2021-3968: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1192903 VUL-0: CVE-2021-3973: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1192904 VUL-0: CVE-2021-3974: vim: vim is vulnerable to Use
After Free
* Fixing bsc#1193466 VUL-1: CVE-2021-4069: vim: use-after-free in
ex_open() in src/ex_docmd.c
* Fixing bsc#1193905 VUL-0: CVE-2021-4136: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1194093 VUL-1: CVE-2021-4166: vim: vim is vulnerable to
Out-of-bounds Read
* Fixing bsc#1194216 VUL-1: CVE-2021-4193: vim: vulnerable to
Out-of-bounds Read
* Fixing bsc#1194217 VUL-0: CVE-2021-4192: vim: vulnerable to Use After
Free
* Fixing bsc#1194872 VUL-0: CVE-2022-0261: vim: Heap-based Buffer
Overflow in vim prior to 8.2.
* Fixing bsc#1194885 VUL-0: CVE-2022-0213: vim: vim is vulnerable to
Heap-based Buffer Overflow
* Fixing bsc#1195004 VUL-0: CVE-2022-0318: vim: Heap-based Buffer
Overflow in vim prior to 8.2.
* Fixing bsc#1195203 VUL-0: CVE-2022-0359: vim: heap-based buffer
overflow in init_ccline() in ex_getln.c
* Fixing bsc#1195354 VUL-0: CVE-2022-0407: vim: Heap-based Buffer
Overflow in Conda vim prior to 8.2.
* Fixing bsc#1198596 VUL-0: CVE-2022-1381: vim: global heap buffer
overflow in skip_range
* Fixing bsc#1199331 VUL-0: CVE-2022-1616: vim: Use after free in
append_command
* Fixing bsc#1199333 VUL-0: CVE-2022-1619: vim: Heap-based Buffer
Overflow in function cmdline_erase_chars
* Fixing bsc#1199334 VUL-0: CVE-2022-1620: vim: NULL Pointer Dereference
in function vim_regexec_string
* Fixing bsc#1199747 VUL-0: CVE-2022-1796: vim: Use After in
find_pattern_in_path
* Fixing bsc#1200010 VUL-0: CVE-2022-1897: vim: Out-of-bounds Write in
vim
* Fixing bsc#1200011 VUL-0: CVE-2022-1898: vim: Use After Free in vim
prior to 8.2
* Fixing bsc#1200012 VUL-0: CVE-2022-1927: vim: Buffer Over-read in vim
prior to 8.2
* Fixing bsc#1070955 VUL-1: CVE-2017-17087: vim: Sets the group
ownership of a .swp file to the editor's primary group, which allows
local users to obtain sensitive information
* Fixing bsc#1194388 VUL-1: CVE-2022-0128: vim: vim is vulnerable to
Out-of-bounds Read
* Fixing bsc#1195332 VUL-1: CVE-2022-0392: vim: Heap-based Buffer
Overflow in vim prior to 8.2
* Fixing bsc#1196361 VUL-1: CVE-2022-0696: vim: NULL Pointer Dereference
in vim prior to 8.2
* Fixing bsc#1198748 VUL-1: CVE-2022-1420: vim: Out-of-range Pointer
Offset
* Fixing bsc#1199651 VUL-1: CVE-2022-1735: vim: heap buffer overflow
* Fixing bsc#1199655 VUL-1: CVE-2022-1733: vim: Heap-based Buffer
Overflow in cindent.c
* Fixing bsc#1199693 VUL-1: CVE-2022-1771: vim: stack exhaustion in vim
prior to 8.2.
* Fixing bsc#1199745 VUL-1: CVE-2022-1785: vim: Out-of-bounds Write
* Fixing bsc#1199936 VUL-1: CVE-2022-1851: vim: out of bounds read
* Fixing bsc#1195004 - (CVE-2022-0318) VUL-0: CVE-2022-0318: vim:
Heap-based Buffer Overflow in vim prior to 8.2.
* Fixing bsc#1190570 CVE-2021-3796: vim: use-after-free in nv_replace()
in normal.c
* Fixing bsc#1191893 CVE-2021-3872: vim: heap-based buffer overflow in
win_redr_status() drawscreen.c
* Fixing bsc#1192481 CVE-2021-3927: vim: vim is vulnerable to Heap-based
Buffer Overflow
* Fixing bsc#1192478 CVE-2021-3928: vim: vim is vulnerable to
Stack-based Buffer Overflow
* Fixing bsc#1193294 CVE-2021-4019: vim: vim is vulnerable to Heap-based
Buffer Overflow
* Fixing bsc#1193298 CVE-2021-3984: vim: illegal memory access when
C-indenting could lead to Heap Buffer Overflow
* Fixing bsc#1190533 CVE-2021-3778: vim: Heap-based Buffer Overflow in
regexp_nfa.c
* Fixing bsc#1194216 CVE-2021-4193: vim: vulnerable to Out-of-bounds
Read
* Fixing bsc#1194556 CVE-2021-46059: vim: A Pointer Dereference
vulnerability exists in Vim 8.2.3883 via the vim_regexec_multi
function at regexp.c, which causes a denial of service.
* Fixing bsc#1195066 CVE-2022-0319: vim: Out-of-bounds Read in vim/vim
prior to 8.2.
* Fixing bsc#1195126 CVE-2022-0351: vim: uncontrolled recursion in
eval7()
* Fixing bsc#1195202 CVE-2022-0361: vim: Heap-based Buffer Overflow in
vim prior to 8.2.
* Fixing bsc#1195356 CVE-2022-0413: vim: use after free in src/ex_cmds.c
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE OpenStack Cloud Crowbar 9:
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2022-4619=1
- SUSE OpenStack Cloud 9:
zypper in -t patch SUSE-OpenStack-Cloud-9-2022-4619=1
- SUSE Linux Enterprise Server for SAP 12-SP4:
zypper in -t patch SUSE-SLE-SAP-12-SP4-2022-4619=1
- SUSE Linux Enterprise Server 12-SP5:
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2022-4619=1
- SUSE Linux Enterprise Server 12-SP4-LTSS:
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2022-4619=1
- SUSE Linux Enterprise Server 12-SP3-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP3-BCL-2022-4619=1
- SUSE Linux Enterprise Server 12-SP2-BCL:
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2022-4619=1
Package List:
- SUSE OpenStack Cloud Crowbar 9 (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE OpenStack Cloud Crowbar 9 (x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE OpenStack Cloud 9 (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE OpenStack Cloud 9 (x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE Linux Enterprise Server for SAP 12-SP4 (ppc64le x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE Linux Enterprise Server for SAP 12-SP4 (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP5 (aarch64 ppc64le s390x x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP5 (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP4-LTSS (aarch64 ppc64le s390x x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP4-LTSS (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP3-BCL (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP3-BCL (x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP2-BCL (noarch):
vim-data-9.0.0814-17.9.1
vim-data-common-9.0.0814-17.9.1
- SUSE Linux Enterprise Server 12-SP2-BCL (x86_64):
gvim-9.0.0814-17.9.1
gvim-debuginfo-9.0.0814-17.9.1
vim-9.0.0814-17.9.1
vim-debuginfo-9.0.0814-17.9.1
vim-debugsource-9.0.0814-17.9.1
References:
https://www.suse.com/security/cve/CVE-2009-0316.html
https://www.suse.com/security/cve/CVE-2016-1248.html
https://www.suse.com/security/cve/CVE-2017-17087.html
https://www.suse.com/security/cve/CVE-2017-5953.html
https://www.suse.com/security/cve/CVE-2017-6349.html
https://www.suse.com/security/cve/CVE-2017-6350.html
https://www.suse.com/security/cve/CVE-2021-3778.html
https://www.suse.com/security/cve/CVE-2021-3796.html
https://www.suse.com/security/cve/CVE-2021-3872.html
https://www.suse.com/security/cve/CVE-2021-3875.html
https://www.suse.com/security/cve/CVE-2021-3903.html
https://www.suse.com/security/cve/CVE-2021-3927.html
https://www.suse.com/security/cve/CVE-2021-3928.html
https://www.suse.com/security/cve/CVE-2021-3968.html
https://www.suse.com/security/cve/CVE-2021-3973.html
https://www.suse.com/security/cve/CVE-2021-3974.html
https://www.suse.com/security/cve/CVE-2021-3984.html
https://www.suse.com/security/cve/CVE-2021-4019.html
https://www.suse.com/security/cve/CVE-2021-4069.html
https://www.suse.com/security/cve/CVE-2021-4136.html
https://www.suse.com/security/cve/CVE-2021-4166.html
https://www.suse.com/security/cve/CVE-2021-4192.html
https://www.suse.com/security/cve/CVE-2021-4193.html
https://www.suse.com/security/cve/CVE-2021-46059.html
https://www.suse.com/security/cve/CVE-2022-0128.html
https://www.suse.com/security/cve/CVE-2022-0213.html
https://www.suse.com/security/cve/CVE-2022-0261.html
https://www.suse.com/security/cve/CVE-2022-0318.html
https://www.suse.com/security/cve/CVE-2022-0319.html
https://www.suse.com/security/cve/CVE-2022-0351.html
https://www.suse.com/security/cve/CVE-2022-0359.html
https://www.suse.com/security/cve/CVE-2022-0361.html
https://www.suse.com/security/cve/CVE-2022-0392.html
https://www.suse.com/security/cve/CVE-2022-0407.html
https://www.suse.com/security/cve/CVE-2022-0413.html
https://www.suse.com/security/cve/CVE-2022-0696.html
https://www.suse.com/security/cve/CVE-2022-1381.html
https://www.suse.com/security/cve/CVE-2022-1420.html
https://www.suse.com/security/cve/CVE-2022-1616.html
https://www.suse.com/security/cve/CVE-2022-1619.html
https://www.suse.com/security/cve/CVE-2022-1620.html
https://www.suse.com/security/cve/CVE-2022-1720.html
https://www.suse.com/security/cve/CVE-2022-1733.html
https://www.suse.com/security/cve/CVE-2022-1735.html
https://www.suse.com/security/cve/CVE-2022-1771.html
https://www.suse.com/security/cve/CVE-2022-1785.html
https://www.suse.com/security/cve/CVE-2022-1796.html
https://www.suse.com/security/cve/CVE-2022-1851.html
https://www.suse.com/security/cve/CVE-2022-1897.html
https://www.suse.com/security/cve/CVE-2022-1898.html
https://www.suse.com/security/cve/CVE-2022-1927.html
https://www.suse.com/security/cve/CVE-2022-1968.html
https://www.suse.com/security/cve/CVE-2022-2124.html
https://www.suse.com/security/cve/CVE-2022-2125.html
https://www.suse.com/security/cve/CVE-2022-2126.html
https://www.suse.com/security/cve/CVE-2022-2129.html
https://www.suse.com/security/cve/CVE-2022-2175.html
https://www.suse.com/security/cve/CVE-2022-2182.html
https://www.suse.com/security/cve/CVE-2022-2183.html
https://www.suse.com/security/cve/CVE-2022-2206.html
https://www.suse.com/security/cve/CVE-2022-2207.html
https://www.suse.com/security/cve/CVE-2022-2208.html
https://www.suse.com/security/cve/CVE-2022-2210.html
https://www.suse.com/security/cve/CVE-2022-2231.html
https://www.suse.com/security/cve/CVE-2022-2257.html
https://www.suse.com/security/cve/CVE-2022-2264.html
https://www.suse.com/security/cve/CVE-2022-2284.html
https://www.suse.com/security/cve/CVE-2022-2285.html
https://www.suse.com/security/cve/CVE-2022-2286.html
https://www.suse.com/security/cve/CVE-2022-2287.html
https://www.suse.com/security/cve/CVE-2022-2304.html
https://www.suse.com/security/cve/CVE-2022-2343.html
https://www.suse.com/security/cve/CVE-2022-2344.html
https://www.suse.com/security/cve/CVE-2022-2345.html
https://www.suse.com/security/cve/CVE-2022-2522.html
https://www.suse.com/security/cve/CVE-2022-2571.html
https://www.suse.com/security/cve/CVE-2022-2580.html
https://www.suse.com/security/cve/CVE-2022-2581.html
https://www.suse.com/security/cve/CVE-2022-2598.html
https://www.suse.com/security/cve/CVE-2022-2816.html
https://www.suse.com/security/cve/CVE-2022-2817.html
https://www.suse.com/security/cve/CVE-2022-2819.html
https://www.suse.com/security/cve/CVE-2022-2845.html
https://www.suse.com/security/cve/CVE-2022-2849.html
https://www.suse.com/security/cve/CVE-2022-2862.html
https://www.suse.com/security/cve/CVE-2022-2874.html
https://www.suse.com/security/cve/CVE-2022-2889.html
https://www.suse.com/security/cve/CVE-2022-2923.html
https://www.suse.com/security/cve/CVE-2022-2946.html
https://www.suse.com/security/cve/CVE-2022-2980.html
https://www.suse.com/security/cve/CVE-2022-2982.html
https://www.suse.com/security/cve/CVE-2022-3016.html
https://www.suse.com/security/cve/CVE-2022-3037.html
https://www.suse.com/security/cve/CVE-2022-3099.html
https://www.suse.com/security/cve/CVE-2022-3134.html
https://www.suse.com/security/cve/CVE-2022-3153.html
https://www.suse.com/security/cve/CVE-2022-3234.html
https://www.suse.com/security/cve/CVE-2022-3235.html
https://www.suse.com/security/cve/CVE-2022-3278.html
https://www.suse.com/security/cve/CVE-2022-3296.html
https://www.suse.com/security/cve/CVE-2022-3297.html
https://www.suse.com/security/cve/CVE-2022-3324.html
https://www.suse.com/security/cve/CVE-2022-3352.html
https://www.suse.com/security/cve/CVE-2022-3705.html
https://bugzilla.suse.com/1070955
https://bugzilla.suse.com/1173256
https://bugzilla.suse.com/1174564
https://bugzilla.suse.com/1176549
https://bugzilla.suse.com/1182324
https://bugzilla.suse.com/1190533
https://bugzilla.suse.com/1190570
https://bugzilla.suse.com/1191770
https://bugzilla.suse.com/1191893
https://bugzilla.suse.com/1192167
https://bugzilla.suse.com/1192478
https://bugzilla.suse.com/1192481
https://bugzilla.suse.com/1192902
https://bugzilla.suse.com/1192903
https://bugzilla.suse.com/1192904
https://bugzilla.suse.com/1193294
https://bugzilla.suse.com/1193298
https://bugzilla.suse.com/1193466
https://bugzilla.suse.com/1193905
https://bugzilla.suse.com/1194093
https://bugzilla.suse.com/1194216
https://bugzilla.suse.com/1194217
https://bugzilla.suse.com/1194388
https://bugzilla.suse.com/1194556
https://bugzilla.suse.com/1194872
https://bugzilla.suse.com/1194885
https://bugzilla.suse.com/1195004
https://bugzilla.suse.com/1195066
https://bugzilla.suse.com/1195126
https://bugzilla.suse.com/1195202
https://bugzilla.suse.com/1195203
https://bugzilla.suse.com/1195332
https://bugzilla.suse.com/1195354
https://bugzilla.suse.com/1195356
https://bugzilla.suse.com/1196361
https://bugzilla.suse.com/1198596
https://bugzilla.suse.com/1198748
https://bugzilla.suse.com/1199331
https://bugzilla.suse.com/1199333
https://bugzilla.suse.com/1199334
https://bugzilla.suse.com/1199651
https://bugzilla.suse.com/1199655
https://bugzilla.suse.com/1199693
https://bugzilla.suse.com/1199745
https://bugzilla.suse.com/1199747
https://bugzilla.suse.com/1199936
https://bugzilla.suse.com/1200010
https://bugzilla.suse.com/1200011
https://bugzilla.suse.com/1200012
https://bugzilla.suse.com/1200270
https://bugzilla.suse.com/1200697
https://bugzilla.suse.com/1200698
https://bugzilla.suse.com/1200700
https://bugzilla.suse.com/1200701
https://bugzilla.suse.com/1200732
https://bugzilla.suse.com/1200884
https://bugzilla.suse.com/1200902
https://bugzilla.suse.com/1200903
https://bugzilla.suse.com/1200904
https://bugzilla.suse.com/1201132
https://bugzilla.suse.com/1201133
https://bugzilla.suse.com/1201134
https://bugzilla.suse.com/1201135
https://bugzilla.suse.com/1201136
https://bugzilla.suse.com/1201150
https://bugzilla.suse.com/1201151
https://bugzilla.suse.com/1201152
https://bugzilla.suse.com/1201153
https://bugzilla.suse.com/1201154
https://bugzilla.suse.com/1201155
https://bugzilla.suse.com/1201249
https://bugzilla.suse.com/1201356
https://bugzilla.suse.com/1201359
https://bugzilla.suse.com/1201363
https://bugzilla.suse.com/1201620
https://bugzilla.suse.com/1201863
https://bugzilla.suse.com/1202046
https://bugzilla.suse.com/1202049
https://bugzilla.suse.com/1202050
https://bugzilla.suse.com/1202051
https://bugzilla.suse.com/1202414
https://bugzilla.suse.com/1202420
https://bugzilla.suse.com/1202421
https://bugzilla.suse.com/1202511
https://bugzilla.suse.com/1202512
https://bugzilla.suse.com/1202515
https://bugzilla.suse.com/1202552
https://bugzilla.suse.com/1202599
https://bugzilla.suse.com/1202687
https://bugzilla.suse.com/1202689
https://bugzilla.suse.com/1202862
https://bugzilla.suse.com/1202962
https://bugzilla.suse.com/1203110
https://bugzilla.suse.com/1203152
https://bugzilla.suse.com/1203155
https://bugzilla.suse.com/1203194
https://bugzilla.suse.com/1203272
https://bugzilla.suse.com/1203508
https://bugzilla.suse.com/1203509
https://bugzilla.suse.com/1203796
https://bugzilla.suse.com/1203797
https://bugzilla.suse.com/1203799
https://bugzilla.suse.com/1203820
https://bugzilla.suse.com/1203924
https://bugzilla.suse.com/1204779
More information about the sle-security-updates
mailing list