SUSE-CU-2023:737-1: Security update of suse/sle-micro/5.2/toolbox

sle-updates at lists.suse.com sle-updates at lists.suse.com
Sat Mar 18 08:08:41 UTC 2023


SUSE Container Update Advisory: suse/sle-micro/5.2/toolbox
-----------------------------------------------------------------
Container Advisory ID : SUSE-CU-2023:737-1
Container Tags        : suse/sle-micro/5.2/toolbox:11.1 , suse/sle-micro/5.2/toolbox:11.1-6.2.183 , suse/sle-micro/5.2/toolbox:latest
Container Release     : 6.2.183
Severity              : important
Type                  : security
References            : 1207780 1208828 1208957 1208959 CVE-2023-0512 CVE-2023-1127 CVE-2023-1170
                        CVE-2023-1175 
-----------------------------------------------------------------

The container suse/sle-micro/5.2/toolbox was updated. The following patches have been included in this update:

-----------------------------------------------------------------
Advisory ID: SUSE-SU-2023:781-1
Released:    Thu Mar 16 19:07:00 2023
Summary:     Security update for vim
Type:        security
Severity:    important
References:  1207780,1208828,1208957,1208959,CVE-2023-0512,CVE-2023-1127,CVE-2023-1170,CVE-2023-1175
This update for vim fixes the following issues:

- CVE-2023-0512: Fixed a divide By Zero (bsc#1207780).
- CVE-2023-1175: vim: an incorrect calculation of buffer size (bsc#1208957).
- CVE-2023-1170: Fixed a heap-based Buffer Overflow (bsc#1208959).
- CVE-2023-1127: Fixed divide by zero in scrolldown() (bsc#1208828).

Updated to version 9.0 with patch level 1386.

- https://github.com/vim/vim/compare/v9.0.1234...v9.0.1386


The following package changes have been done:

- vim-data-common-9.0.1386-150000.5.37.1 updated
- vim-9.0.1386-150000.5.37.1 updated


More information about the sle-updates mailing list