SUSE-SU-2022:0736-1: important: Security update for vim

sle-security-updates at lists.suse.com sle-security-updates at lists.suse.com
Fri Mar 4 17:18:06 UTC 2022


   SUSE Security Update: Security update for vim
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0736-1
Rating:             important
References:         #1190533 #1190570 #1191893 #1192478 #1192481 
                    #1193294 #1193298 #1194216 #1194556 #1195004 
                    #1195066 #1195126 #1195202 #1195356 
Cross-References:   CVE-2021-3778 CVE-2021-3796 CVE-2021-3872
                    CVE-2021-3927 CVE-2021-3928 CVE-2021-3984
                    CVE-2021-4019 CVE-2021-4193 CVE-2021-46059
                    CVE-2022-0318 CVE-2022-0319 CVE-2022-0351
                    CVE-2022-0361 CVE-2022-0413
CVSS scores:
                    CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3778 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
                    CVE-2021-3796 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3927 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3928 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE CaaS Platform 4.0
                    SUSE Enterprise Storage 6
                    SUSE Enterprise Storage 7
                    SUSE Linux Enterprise Desktop 15-SP3
                    SUSE Linux Enterprise Desktop 15-SP4
                    SUSE Linux Enterprise High Performance Computing 15-ESPOS
                    SUSE Linux Enterprise High Performance Computing 15-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS
                    SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS
                    SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS
                    SUSE Linux Enterprise High Performance Computing 15-SP3
                    SUSE Linux Enterprise High Performance Computing 15-SP4
                    SUSE Linux Enterprise Micro 5.0
                    SUSE Linux Enterprise Micro 5.1
                    SUSE Linux Enterprise Module for Basesystem 15-SP3
                    SUSE Linux Enterprise Module for Basesystem 15-SP4
                    SUSE Linux Enterprise Module for Desktop Applications 15-SP3
                    SUSE Linux Enterprise Module for Desktop Applications 15-SP4
                    SUSE Linux Enterprise Realtime Extension 15-SP2
                    SUSE Linux Enterprise Server 15-LTSS
                    SUSE Linux Enterprise Server 15-SP1-BCL
                    SUSE Linux Enterprise Server 15-SP1-LTSS
                    SUSE Linux Enterprise Server 15-SP2-BCL
                    SUSE Linux Enterprise Server 15-SP2-LTSS
                    SUSE Linux Enterprise Server 15-SP3
                    SUSE Linux Enterprise Server 15-SP4
                    SUSE Linux Enterprise Server for SAP 15
                    SUSE Linux Enterprise Server for SAP 15-SP1
                    SUSE Linux Enterprise Server for SAP 15-SP2
                    SUSE Linux Enterprise Server for SAP Applications 15-SP3
                    SUSE Linux Enterprise Server for SAP Applications 15-SP4
                    SUSE Manager Proxy 4.1
                    SUSE Manager Proxy 4.2
                    SUSE Manager Retail Branch Server 4.1
                    SUSE Manager Server 4.1
                    SUSE Manager Server 4.2
______________________________________________________________________________

   An update that fixes 14 vulnerabilities is now available.

Description:

   This update for vim fixes the following issues:

   - CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
   - CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c
     (bsc#1190570).
   - CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status()
     drawscreen.c (bsc#1191893).
   - CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
   - CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
   - CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
   - CVE-2021-3984: Fixed illegal memory access when C-indenting could have
     led to heap buffer overflow (bsc#1193298).
   - CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c
     (bsc#1190533).
   - CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
   - CVE-2021-46059: Fixed pointer dereference vulnerability via the
     vim_regexec_multi function at regexp.c (bsc#1194556).
   - CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
   - CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
   - CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
   - CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Manager Server 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Server-4.1-2022-736=1

   - SUSE Manager Retail Branch Server 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Retail-Branch-Server-4.1-2022-736=1

   - SUSE Manager Proxy 4.1:

      zypper in -t patch SUSE-SLE-Product-SUSE-Manager-Proxy-4.1-2022-736=1

   - SUSE Linux Enterprise Server for SAP 15-SP2:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP2-2022-736=1

   - SUSE Linux Enterprise Server for SAP 15-SP1:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-SP1-2022-736=1

   - SUSE Linux Enterprise Server for SAP 15:

      zypper in -t patch SUSE-SLE-Product-SLES_SAP-15-2022-736=1

   - SUSE Linux Enterprise Server 15-SP2-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-LTSS-2022-736=1

   - SUSE Linux Enterprise Server 15-SP2-BCL:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP2-BCL-2022-736=1

   - SUSE Linux Enterprise Server 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-LTSS-2022-736=1

   - SUSE Linux Enterprise Server 15-SP1-BCL:

      zypper in -t patch SUSE-SLE-Product-SLES-15-SP1-BCL-2022-736=1

   - SUSE Linux Enterprise Server 15-LTSS:

      zypper in -t patch SUSE-SLE-Product-SLES-15-2022-736=1

   - SUSE Linux Enterprise Realtime Extension 15-SP2:

      zypper in -t patch SUSE-SLE-Product-RT-15-SP2-2022-736=1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP4-2022-736=1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Desktop-Applications-15-SP3-2022-736=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP4-2022-736=1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3:

      zypper in -t patch SUSE-SLE-Module-Basesystem-15-SP3-2022-736=1

   - SUSE Linux Enterprise Micro 5.1:

      zypper in -t patch SUSE-SUSE-MicroOS-5.1-2022-736=1

   - SUSE Linux Enterprise Micro 5.0:

      zypper in -t patch SUSE-SUSE-MicroOS-5.0-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-LTSS-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP2-ESPOS-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-LTSS-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-SP1-ESPOS-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-LTSS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-2022-736=1

   - SUSE Linux Enterprise High Performance Computing 15-ESPOS:

      zypper in -t patch SUSE-SLE-Product-HPC-15-2022-736=1

   - SUSE Enterprise Storage 7:

      zypper in -t patch SUSE-Storage-7-2022-736=1

   - SUSE Enterprise Storage 6:

      zypper in -t patch SUSE-Storage-6-2022-736=1

   - SUSE CaaS Platform 4.0:

      To install this update, use the SUSE CaaS Platform 'skuba' tool. It
      will inform you if it detects new updates and let you then trigger
      updating of the complete cluster in a controlled way.



Package List:

   - SUSE Manager Server 4.1 (ppc64le s390x x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Manager Server 4.1 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Manager Retail Branch Server 4.1 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Manager Retail Branch Server 4.1 (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Manager Proxy 4.1 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Manager Proxy 4.1 (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15-SP2 (ppc64le x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15-SP2 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15-SP1 (ppc64le x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15-SP1 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15 (ppc64le x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server for SAP 15 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP2-LTSS (aarch64 ppc64le s390x x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP2-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP2-BCL (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP2-BCL (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (aarch64 ppc64le s390x x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP1-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP1-BCL (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-SP1-BCL (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-LTSS (aarch64 s390x):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Server 15-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Realtime Extension 15-SP2 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Realtime Extension 15-SP2 (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP4 (aarch64 ppc64le s390x x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Desktop Applications 15-SP3 (aarch64 ppc64le s390x x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (aarch64 ppc64le s390x x86_64):

      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1
      vim-small-8.0.1568-5.17.1
      vim-small-debuginfo-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP4 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (aarch64 ppc64le s390x x86_64):

      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1
      vim-small-8.0.1568-5.17.1
      vim-small-debuginfo-8.0.1568-5.17.1

   - SUSE Linux Enterprise Module for Basesystem 15-SP3 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Micro 5.1 (aarch64 s390x x86_64):

      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1
      vim-small-8.0.1568-5.17.1
      vim-small-debuginfo-8.0.1568-5.17.1

   - SUSE Linux Enterprise Micro 5.1 (noarch):

      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise Micro 5.0 (aarch64 x86_64):

      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1
      vim-small-8.0.1568-5.17.1
      vim-small-debuginfo-8.0.1568-5.17.1

   - SUSE Linux Enterprise Micro 5.0 (noarch):

      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP2-ESPOS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-SP1-ESPOS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-LTSS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-LTSS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-ESPOS (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Linux Enterprise High Performance Computing 15-ESPOS (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Enterprise Storage 7 (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Enterprise Storage 7 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE Enterprise Storage 6 (aarch64 x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1

   - SUSE Enterprise Storage 6 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE CaaS Platform 4.0 (noarch):

      vim-data-8.0.1568-5.17.1
      vim-data-common-8.0.1568-5.17.1

   - SUSE CaaS Platform 4.0 (x86_64):

      gvim-8.0.1568-5.17.1
      gvim-debuginfo-8.0.1568-5.17.1
      vim-8.0.1568-5.17.1
      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1


References:

   https://www.suse.com/security/cve/CVE-2021-3778.html
   https://www.suse.com/security/cve/CVE-2021-3796.html
   https://www.suse.com/security/cve/CVE-2021-3872.html
   https://www.suse.com/security/cve/CVE-2021-3927.html
   https://www.suse.com/security/cve/CVE-2021-3928.html
   https://www.suse.com/security/cve/CVE-2021-3984.html
   https://www.suse.com/security/cve/CVE-2021-4019.html
   https://www.suse.com/security/cve/CVE-2021-4193.html
   https://www.suse.com/security/cve/CVE-2021-46059.html
   https://www.suse.com/security/cve/CVE-2022-0318.html
   https://www.suse.com/security/cve/CVE-2022-0319.html
   https://www.suse.com/security/cve/CVE-2022-0351.html
   https://www.suse.com/security/cve/CVE-2022-0361.html
   https://www.suse.com/security/cve/CVE-2022-0413.html
   https://bugzilla.suse.com/1190533
   https://bugzilla.suse.com/1190570
   https://bugzilla.suse.com/1191893
   https://bugzilla.suse.com/1192478
   https://bugzilla.suse.com/1192481
   https://bugzilla.suse.com/1193294
   https://bugzilla.suse.com/1193298
   https://bugzilla.suse.com/1194216
   https://bugzilla.suse.com/1194556
   https://bugzilla.suse.com/1195004
   https://bugzilla.suse.com/1195066
   https://bugzilla.suse.com/1195126
   https://bugzilla.suse.com/1195202
   https://bugzilla.suse.com/1195356



More information about the sle-security-updates mailing list