SUSE-CU-2023:737-1: Security update of suse/sle-micro/5.2/toolbox
sle-security-updates at lists.suse.com
sle-security-updates at lists.suse.com
Sat Mar 18 08:08:41 UTC 2023
SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:737-1
Container Tags : suse/sle-micro/5.2/toolbox:11.1 , suse/sle-micro/5.2/toolbox:11.1-6.2.183 , suse/sle-micro/5.2/toolbox:latest
Container Release : 6.2.183
Severity : important
Type : security
References : 1207780 1208828 1208957 1208959 CVE-2023-0512 CVE-2023-1127 CVE-2023-1170
CVE-2023-1175
-----------------------------------------------------------------
The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update:
-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:781-1
Released: Thu Mar 16 19:07:00 2023
Summary: Security update for vim
Type: security
Severity: important
References: 1207780,1208828,1208957,1208959,CVE-2023-0512,CVE-2023-1127,CVE-2023-1170,CVE-2023-1175
This update for vim fixes the following issues:
- CVE-2023-0512: Fixed a divide By Zero (bsc#1207780).
- CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957).
- CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).
Updated to version 9.0 with patch level 1386.
- https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386
The following package changes have been done:
- vim-data-common-9.0.1386-150000.5.37.1 updated
- vim-9.0.1386-150000.5.37.1 updated
More information about the sle-security-updates
mailing list