SUSE-SU-2022:0736-2: important: Security update for vim
sle-updates at lists.suse.com
sle-updates at lists.suse.com
Tue Apr 19 22:27:14 UTC 2022
SUSE Security Update: Security update for vim
______________________________________________________________________________
Announcement ID: SUSE-SU-2022:0736-2
Rating: important
References: #1190533 #1190570 #1191893 #1192478 #1192481
#1193294 #1193298 #1194216 #1194556 #1195004
#1195066 #1195126 #1195202 #1195356
Cross-References: CVE-2021-3778 CVE-2021-3796 CVE-2021-3872
CVE-2021-3927 CVE-2021-3928 CVE-2021-3984
CVE-2021-4019 CVE-2021-4193 CVE-2021-46059
CVE-2022-0318 CVE-2022-0319 CVE-2022-0351
CVE-2022-0361 CVE-2022-0413
CVSS scores:
CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3778 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
CVE-2021-3796 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3927 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2021-3928 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
CVE-2022-0319 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
SUSE Linux Enterprise Micro 5.2
______________________________________________________________________________
An update that fixes 14 vulnerabilities is now available.
Description:
This update for vim fixes the following issues:
- CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
- CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c
(bsc#1190570).
- CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status()
drawscreen.c (bsc#1191893).
- CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
- CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
- CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
- CVE-2021-3984: Fixed illegal memory access when C-indenting could have
led to heap buffer overflow (bsc#1193298).
- CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c
(bsc#1190533).
- CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
- CVE-2021-46059: Fixed pointer dereference vulnerability via the
vim_regexec_multi function at regexp.c (bsc#1194556).
- CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
- CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
- CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
- CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).
Patch Instructions:
To install this SUSE Security Update use the SUSE recommended installation methods
like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
- SUSE Linux Enterprise Micro 5.2:
zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-736=1
Package List:
- SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):
vim-debuginfo-8.0.1568-5.17.1
vim-debugsource-8.0.1568-5.17.1
vim-small-8.0.1568-5.17.1
vim-small-debuginfo-8.0.1568-5.17.1
- SUSE Linux Enterprise Micro 5.2 (noarch):
vim-data-common-8.0.1568-5.17.1
References:
https://www.suse.com/security/cve/CVE-2021-3778.html
https://www.suse.com/security/cve/CVE-2021-3796.html
https://www.suse.com/security/cve/CVE-2021-3872.html
https://www.suse.com/security/cve/CVE-2021-3927.html
https://www.suse.com/security/cve/CVE-2021-3928.html
https://www.suse.com/security/cve/CVE-2021-3984.html
https://www.suse.com/security/cve/CVE-2021-4019.html
https://www.suse.com/security/cve/CVE-2021-4193.html
https://www.suse.com/security/cve/CVE-2021-46059.html
https://www.suse.com/security/cve/CVE-2022-0318.html
https://www.suse.com/security/cve/CVE-2022-0319.html
https://www.suse.com/security/cve/CVE-2022-0351.html
https://www.suse.com/security/cve/CVE-2022-0361.html
https://www.suse.com/security/cve/CVE-2022-0413.html
https://bugzilla.suse.com/1190533
https://bugzilla.suse.com/1190570
https://bugzilla.suse.com/1191893
https://bugzilla.suse.com/1192478
https://bugzilla.suse.com/1192481
https://bugzilla.suse.com/1193294
https://bugzilla.suse.com/1193298
https://bugzilla.suse.com/1194216
https://bugzilla.suse.com/1194556
https://bugzilla.suse.com/1195004
https://bugzilla.suse.com/1195066
https://bugzilla.suse.com/1195126
https://bugzilla.suse.com/1195202
https://bugzilla.suse.com/1195356
More information about the sle-updates
mailing list