SUSE-SU-2022:0736-2: important: Security update for vim

sle-updates at lists.suse.com sle-updates at lists.suse.com
Tue Apr 19 22:27:14 UTC 2022


   SUSE Security Update: Security update for vim
______________________________________________________________________________

Announcement ID:    SUSE-SU-2022:0736-2
Rating:             important
References:         #1190533 #1190570 #1191893 #1192478 #1192481 
                    #1193294 #1193298 #1194216 #1194556 #1195004 
                    #1195066 #1195126 #1195202 #1195356 
Cross-References:   CVE-2021-3778 CVE-2021-3796 CVE-2021-3872
                    CVE-2021-3927 CVE-2021-3928 CVE-2021-3984
                    CVE-2021-4019 CVE-2021-4193 CVE-2021-46059
                    CVE-2022-0318 CVE-2022-0319 CVE-2022-0351
                    CVE-2022-0361 CVE-2022-0413
CVSS scores:
                    CVE-2021-3778 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3778 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3796 (NVD) : 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
                    CVE-2021-3796 (SUSE): 7.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3872 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3872 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3927 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3927 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3928 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2021-3928 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-3984 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4019 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2021-4019 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2021-4193 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2021-4193 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2021-46059 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0318 (SUSE): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
                    CVE-2022-0319 (NVD) : 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
                    CVE-2022-0319 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
                    CVE-2022-0351 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
                    CVE-2022-0351 (SUSE): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
                    CVE-2022-0361 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0361 (SUSE): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
                    CVE-2022-0413 (NVD) : 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
                    CVE-2022-0413 (SUSE): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Affected Products:
                    SUSE Linux Enterprise Micro 5.2
______________________________________________________________________________

   An update that fixes 14 vulnerabilities is now available.

Description:

   This update for vim fixes the following issues:

   - CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
   - CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c
     (bsc#1190570).
   - CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status()
     drawscreen.c (bsc#1191893).
   - CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
   - CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
   - CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
   - CVE-2021-3984: Fixed illegal memory access when C-indenting could have
     led to heap buffer overflow (bsc#1193298).
   - CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c
     (bsc#1190533).
   - CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
   - CVE-2021-46059: Fixed pointer dereference vulnerability via the
     vim_regexec_multi function at regexp.c (bsc#1194556).
   - CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
   - CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
   - CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
   - CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).


Patch Instructions:

   To install this SUSE Security Update use the SUSE recommended installation methods
   like YaST online_update or "zypper patch".

   Alternatively you can run the command listed for your product:

   - SUSE Linux Enterprise Micro 5.2:

      zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-736=1



Package List:

   - SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64):

      vim-debuginfo-8.0.1568-5.17.1
      vim-debugsource-8.0.1568-5.17.1
      vim-small-8.0.1568-5.17.1
      vim-small-debuginfo-8.0.1568-5.17.1

   - SUSE Linux Enterprise Micro 5.2 (noarch):

      vim-data-common-8.0.1568-5.17.1


References:

   https://www.suse.com/security/cve/CVE-2021-3778.html
   https://www.suse.com/security/cve/CVE-2021-3796.html
   https://www.suse.com/security/cve/CVE-2021-3872.html
   https://www.suse.com/security/cve/CVE-2021-3927.html
   https://www.suse.com/security/cve/CVE-2021-3928.html
   https://www.suse.com/security/cve/CVE-2021-3984.html
   https://www.suse.com/security/cve/CVE-2021-4019.html
   https://www.suse.com/security/cve/CVE-2021-4193.html
   https://www.suse.com/security/cve/CVE-2021-46059.html
   https://www.suse.com/security/cve/CVE-2022-0318.html
   https://www.suse.com/security/cve/CVE-2022-0319.html
   https://www.suse.com/security/cve/CVE-2022-0351.html
   https://www.suse.com/security/cve/CVE-2022-0361.html
   https://www.suse.com/security/cve/CVE-2022-0413.html
   https://bugzilla.suse.com/1190533
   https://bugzilla.suse.com/1190570
   https://bugzilla.suse.com/1191893
   https://bugzilla.suse.com/1192478
   https://bugzilla.suse.com/1192481
   https://bugzilla.suse.com/1193294
   https://bugzilla.suse.com/1193298
   https://bugzilla.suse.com/1194216
   https://bugzilla.suse.com/1194556
   https://bugzilla.suse.com/1195004
   https://bugzilla.suse.com/1195066
   https://bugzilla.suse.com/1195126
   https://bugzilla.suse.com/1195202
   https://bugzilla.suse.com/1195356



More information about the sle-updates mailing list