Описание
Security update for vim
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 0313:
- CVE-2022-2183: Fixed out-of-bounds read through get_lisp_indent() (bsc#1200902).
- CVE-2022-2182: Fixed heap-based buffer overflow through parse_cmd_address() (bsc#1200903).
- CVE-2022-2175: Fixed buffer over-read through cmdline_insert_reg() (bsc#1200904).
- CVE-2022-2304: Fixed stack buffer overflow in spell_dump_compl() (bsc#1201249).
- CVE-2022-2343: Fixed heap-based buffer overflow in GitHub repository vim prior to 9.0.0044 (bsc#1201356).
- CVE-2022-2344: Fixed another heap-based buffer overflow vim prior to 9.0.0045 (bsc#1201359).
- CVE-2022-2345: Fixed use after free in GitHub repository vim prior to 9.0.0046. (bsc#1201363).
- CVE-2022-2819: Fixed heap-based Buffer Overflow in compile_lock_unlock() (bsc#1202414).
- CVE-2022-2874: Fixed NULL Pointer Dereference in generate_loadvar() (bsc#1202552).
- CVE-2022-1968: Fixed use after free in utf_ptr2char (bsc#1200270).
- CVE-2022-2124: Fixed out of bounds read in current_quote() (bsc#1200697).
- CVE-2022-2125: Fixed out of bounds read in get_lisp_indent() (bsc#1200698).
- CVE-2022-2126: Fixed out of bounds read in suggest_trie_walk() (bsc#1200700).
- CVE-2022-2129: Fixed out of bounds write in vim_regsub_both() (bsc#1200701).
- CVE-2022-1720: Fixed out of bounds read in grab_file_name() (bsc#1200732).
- CVE-2022-2264: Fixed out of bounds read in inc() (bsc#1201132).
- CVE-2022-2284: Fixed out of bounds read in utfc_ptr2len() (bsc#1201133).
- CVE-2022-2285: Fixed negative size passed to memmove() due to integer overflow (bsc#1201134).
- CVE-2022-2286: Fixed out of bounds read in ins_bytes() (bsc#1201135).
- CVE-2022-2287: Fixed out of bounds read in suggest_trie_walk() (bsc#1201136).
- CVE-2022-2231: Fixed null pointer dereference skipwhite() (bsc#1201150).
- CVE-2022-2210: Fixed out of bounds read in ml_append_int() (bsc#1201151).
- CVE-2022-2208: Fixed null pointer dereference in diff_check() (bsc#1201152).
- CVE-2022-2207: Fixed out of bounds read in ins_bs() (bsc#1201153).
- CVE-2022-2257: Fixed out of bounds read in msg_outtrans_special() (bsc#1201154).
- CVE-2022-2206: Fixed out of bounds read in msg_outtrans_attr() (bsc#1201155).
- CVE-2022-2522: Fixed out of bounds read via nested autocommand (bsc#1201863).
- CVE-2022-2571: Fixed heap-based buffer overflow related to ins_comp_get_next_word_or_line() (bsc#1202046).
- CVE-2022-2580: Fixed heap-based buffer overflow related to eval_string() (bsc#1202049).
- CVE-2022-2581: Fixed out-of-bounds read related to cstrchr() (bsc#1202050).
- CVE-2022-2598: Fixed undefined behavior for Input to API related to diff_mark_adjust_tp() and ex_diffgetput() (bsc#1202051).
- CVE-2022-2817: Fixed use after gree in f_assert_fails() (bsc#1202420).
- CVE-2022-2816: Fixed out-of-bounds Read in check_vim9_unlet() (bsc#1202421).
- CVE-2022-2862: Fixed use-after-free in compile_nested_function() (bsc#1202511).
- CVE-2022-2849: Fixed invalid memory access related to mb_ptr2len() (bsc#1202512).
- CVE-2022-2845: Fixed buffer Over-read related to display_dollar() (bsc#1202515).
- CVE-2022-2889: Fixed use-after-free in find_var_also_in_script() in evalvars.c (bsc#1202599).
- CVE-2022-2923: Fixed NULL pointer dereference in GitHub repository vim/vim prior to 9.0.0240 (bsc#1202687).
- CVE-2022-2946: Fixed use after free in function vim_vsnprintf_typval (bsc#1202689).
- CVE-2022-3016: Fixed use after free in vim prior to 9.0.0285 (bsc#1202862).
Bugfixes:
- Fixing vim error on startup (bsc#1200884).
- Fixing vim SUSE Linux Enterprise Server 15 SP4 Basesystem plugin-tlib issue (bsc#1201620).
Список пакетов
Container ses/7.1/ceph/haproxy:latest
Container suse/sle-micro-rancher/5.2:latest
Container suse/sle-micro-rancher/5.3:latest
Container suse/sle-micro-rancher/5.4:latest
Container suse/sle-micro/5.1/toolbox:latest
Container suse/sle-micro/5.2/toolbox:latest
Container suse/sle-micro/5.3/toolbox:latest
Container suse/sle-micro/5.4/toolbox:latest
Image SLES15-SP1-SAP-Azure-LI-BYOS-Production
Image SLES15-SP1-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP1-SAPCAL-Azure
Image SLES15-SP1-SAPCAL-EC2-HVM
Image SLES15-SP1-SAPCAL-GCE
Image SLES15-SP2-BYOS-Azure
Image SLES15-SP2-BYOS-EC2-HVM
Image SLES15-SP2-BYOS-GCE
Image SLES15-SP2-HPC-BYOS-Azure
Image SLES15-SP2-HPC-BYOS-EC2-HVM
Image SLES15-SP2-SAP-Azure
Image SLES15-SP2-SAP-Azure-LI-BYOS-Production
Image SLES15-SP2-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP2-SAP-BYOS-Azure
Image SLES15-SP2-SAP-BYOS-EC2-HVM
Image SLES15-SP2-SAP-BYOS-GCE
Image SLES15-SP2-SAP-EC2-HVM
Image SLES15-SP2-SAP-GCE
Image SLES15-SP3-BYOS-Azure
Image SLES15-SP3-BYOS-EC2-HVM
Image SLES15-SP3-BYOS-GCE
Image SLES15-SP3-CHOST-BYOS-Aliyun
Image SLES15-SP3-CHOST-BYOS-Azure
Image SLES15-SP3-CHOST-BYOS-EC2
Image SLES15-SP3-CHOST-BYOS-GCE
Image SLES15-SP3-CHOST-BYOS-SAP-CCloud
Image SLES15-SP3-HPC-BYOS-Azure
Image SLES15-SP3-HPC-BYOS-EC2-HVM
Image SLES15-SP3-HPC-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Proxy-BYOS-GCE
Image SLES15-SP3-Manager-4-2-Server-BYOS-Azure
Image SLES15-SP3-Manager-4-2-Server-BYOS-EC2-HVM
Image SLES15-SP3-Manager-4-2-Server-BYOS-GCE
Image SLES15-SP3-Micro-5-1-BYOS-Azure
Image SLES15-SP3-Micro-5-1-BYOS-EC2-HVM
Image SLES15-SP3-Micro-5-1-BYOS-GCE
Image SLES15-SP3-Micro-5-2-BYOS-Azure
Image SLES15-SP3-Micro-5-2-BYOS-EC2-HVM
Image SLES15-SP3-Micro-5-2-BYOS-GCE
Image SLES15-SP3-SAP-Azure-LI-BYOS-Production
Image SLES15-SP3-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP3-SAP-BYOS-Azure
Image SLES15-SP3-SAP-BYOS-EC2-HVM
Image SLES15-SP3-SAP-BYOS-GCE
Image SLES15-SP3-SAPCAL-Azure
Image SLES15-SP3-SAPCAL-EC2-HVM
Image SLES15-SP3-SAPCAL-GCE
Image SLES15-SP4
Image SLES15-SP4-Azure-Basic
Image SLES15-SP4-Azure-Standard
Image SLES15-SP4-BYOS
Image SLES15-SP4-BYOS-Azure
Image SLES15-SP4-BYOS-EC2
Image SLES15-SP4-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS
Image SLES15-SP4-CHOST-BYOS-Aliyun
Image SLES15-SP4-CHOST-BYOS-Azure
Image SLES15-SP4-CHOST-BYOS-EC2
Image SLES15-SP4-CHOST-BYOS-GCE
Image SLES15-SP4-CHOST-BYOS-SAP-CCloud
Image SLES15-SP4-EC2
Image SLES15-SP4-EC2-ECS-HVM
Image SLES15-SP4-GCE
Image SLES15-SP4-HPC
Image SLES15-SP4-HPC-Azure
Image SLES15-SP4-HPC-BYOS
Image SLES15-SP4-HPC-BYOS-Azure
Image SLES15-SP4-HPC-BYOS-EC2
Image SLES15-SP4-HPC-BYOS-GCE
Image SLES15-SP4-HPC-EC2
Image SLES15-SP4-HPC-GCE
Image SLES15-SP4-Hardened-BYOS
Image SLES15-SP4-Hardened-BYOS-Azure
Image SLES15-SP4-Hardened-BYOS-EC2
Image SLES15-SP4-Hardened-BYOS-GCE
Image SLES15-SP4-Manager-Proxy-4-3-BYOS
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Proxy-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3
Image SLES15-SP4-Manager-Server-4-3-Azure-llc
Image SLES15-SP4-Manager-Server-4-3-Azure-ltd
Image SLES15-SP4-Manager-Server-4-3-BYOS
Image SLES15-SP4-Manager-Server-4-3-BYOS-Azure
Image SLES15-SP4-Manager-Server-4-3-BYOS-EC2
Image SLES15-SP4-Manager-Server-4-3-BYOS-GCE
Image SLES15-SP4-Manager-Server-4-3-EC2-llc
Image SLES15-SP4-Manager-Server-4-3-EC2-ltd
Image SLES15-SP4-Micro-5-3
Image SLES15-SP4-Micro-5-3-Azure
Image SLES15-SP4-Micro-5-3-BYOS
Image SLES15-SP4-Micro-5-3-BYOS-Azure
Image SLES15-SP4-Micro-5-3-BYOS-EC2
Image SLES15-SP4-Micro-5-3-BYOS-GCE
Image SLES15-SP4-Micro-5-3-EC2
Image SLES15-SP4-Micro-5-3-GCE
Image SLES15-SP4-Micro-5-4
Image SLES15-SP4-Micro-5-4-Azure
Image SLES15-SP4-Micro-5-4-BYOS
Image SLES15-SP4-Micro-5-4-BYOS-Azure
Image SLES15-SP4-Micro-5-4-BYOS-EC2
Image SLES15-SP4-Micro-5-4-BYOS-GCE
Image SLES15-SP4-Micro-5-4-EC2
Image SLES15-SP4-Micro-5-4-GCE
Image SLES15-SP4-SAP
Image SLES15-SP4-SAP-Azure
Image SLES15-SP4-SAP-Azure-LI-BYOS
Image SLES15-SP4-SAP-Azure-LI-BYOS-Production
Image SLES15-SP4-SAP-Azure-VLI-BYOS
Image SLES15-SP4-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP4-SAP-BYOS
Image SLES15-SP4-SAP-BYOS-Azure
Image SLES15-SP4-SAP-BYOS-EC2
Image SLES15-SP4-SAP-BYOS-GCE
Image SLES15-SP4-SAP-EC2
Image SLES15-SP4-SAP-GCE
Image SLES15-SP4-SAP-Hardened
Image SLES15-SP4-SAP-Hardened-Azure
Image SLES15-SP4-SAP-Hardened-BYOS
Image SLES15-SP4-SAP-Hardened-BYOS-Azure
Image SLES15-SP4-SAP-Hardened-BYOS-EC2
Image SLES15-SP4-SAP-Hardened-BYOS-GCE
Image SLES15-SP4-SAP-Hardened-EC2
Image SLES15-SP4-SAP-Hardened-GCE
Image SLES15-SP4-SAPCAL
Image SLES15-SP4-SAPCAL-Azure
Image SLES15-SP4-SAPCAL-EC2
Image SLES15-SP4-SAPCAL-GCE
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS
Image SLES15-SP4-SUSE-Rancher-Setup-BYOS-EC2
SUSE Enterprise Storage 6
SUSE Enterprise Storage 7
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS
SUSE Linux Enterprise High Performance Computing 15-ESPOS
SUSE Linux Enterprise High Performance Computing 15-LTSS
SUSE Linux Enterprise Micro 5.1
SUSE Linux Enterprise Micro 5.2
SUSE Linux Enterprise Module for Basesystem 15 SP3
SUSE Linux Enterprise Module for Basesystem 15 SP4
SUSE Linux Enterprise Module for Desktop Applications 15 SP3
SUSE Linux Enterprise Module for Desktop Applications 15 SP4
SUSE Linux Enterprise Server 15 SP1-BCL
SUSE Linux Enterprise Server 15 SP1-LTSS
SUSE Linux Enterprise Server 15 SP2-BCL
SUSE Linux Enterprise Server 15 SP2-LTSS
SUSE Linux Enterprise Server 15-LTSS
SUSE Linux Enterprise Server for SAP Applications 15
SUSE Linux Enterprise Server for SAP Applications 15 SP1
SUSE Linux Enterprise Server for SAP Applications 15 SP2
SUSE Manager Proxy 4.1
SUSE Manager Retail Branch Server 4.1
SUSE Manager Server 4.1
openSUSE Leap 15.3
openSUSE Leap 15.4
openSUSE Leap Micro 5.2
Ссылки
- Link for SUSE-SU-2022:3229-1
- E-Mail link for SUSE-SU-2022:3229-1
- SUSE Security Ratings
- SUSE Bug 1200270
- SUSE Bug 1200697
- SUSE Bug 1200698
- SUSE Bug 1200700
- SUSE Bug 1200701
- SUSE Bug 1200732
- SUSE Bug 1200884
- SUSE Bug 1200902
- SUSE Bug 1200903
- SUSE Bug 1200904
- SUSE Bug 1201132
- SUSE Bug 1201133
- SUSE Bug 1201134
- SUSE Bug 1201135
- SUSE Bug 1201136
- SUSE Bug 1201150
- SUSE Bug 1201151
Описание
Buffer Over-read in function grab_file_name in GitHub repository vim/vim prior to 8.2.4956. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
Затронутые продукты
Ссылки
- CVE-2022-1720
- SUSE Bug 1200732
Описание
Use After Free in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-1968
- SUSE Bug 1200270
Описание
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2124
- SUSE Bug 1200697
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2125
- SUSE Bug 1200698
- SUSE Bug 1205395
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2126
- SUSE Bug 1200700
Описание
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2129
- SUSE Bug 1200701
Описание
Buffer Over-read in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2175
- SUSE Bug 1200904
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2182
- SUSE Bug 1200903
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2183
- SUSE Bug 1200902
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2206
- SUSE Bug 1201155
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2207
- SUSE Bug 1201153
Описание
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.5163.
Затронутые продукты
Ссылки
- CVE-2022-2208
- SUSE Bug 1201152
Описание
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2210
- SUSE Bug 1201151
Описание
NULL Pointer Dereference in GitHub repository vim/vim prior to 8.2.
Затронутые продукты
Ссылки
- CVE-2022-2231
- SUSE Bug 1201150
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2257
- SUSE Bug 1201154
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2264
- SUSE Bug 1201132
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2284
- SUSE Bug 1201133
Описание
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2285
- SUSE Bug 1201134
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2286
- SUSE Bug 1201135
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2287
- SUSE Bug 1201136
Описание
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
Затронутые продукты
Ссылки
- CVE-2022-2304
- SUSE Bug 1201249
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
Затронутые продукты
Ссылки
- CVE-2022-2343
- SUSE Bug 1201356
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
Затронутые продукты
Ссылки
- CVE-2022-2344
- SUSE Bug 1201359
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0046.
Затронутые продукты
Ссылки
- CVE-2022-2345
- SUSE Bug 1201363
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.
Затронутые продукты
Ссылки
- CVE-2022-2522
- SUSE Bug 1201863
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
Затронутые продукты
Ссылки
- CVE-2022-2571
- SUSE Bug 1202046
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.
Затронутые продукты
Ссылки
- CVE-2022-2580
- SUSE Bug 1202049
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
Затронутые продукты
Ссылки
- CVE-2022-2581
- SUSE Bug 1202050
Описание
Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.
Затронутые продукты
Ссылки
- CVE-2022-2598
- SUSE Bug 1202051
Описание
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0212.
Затронутые продукты
Ссылки
- CVE-2022-2816
- SUSE Bug 1202421
- SUSE Bug 1203576
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0213.
Затронутые продукты
Ссылки
- CVE-2022-2817
- SUSE Bug 1202420
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0211.
Затронутые продукты
Ссылки
- CVE-2022-2819
- SUSE Bug 1202414
- SUSE Bug 1203576
Описание
Improper Validation of Specified Quantity in Input in GitHub repository vim/vim prior to 9.0.0218.
Затронутые продукты
Ссылки
- CVE-2022-2845
- SUSE Bug 1202515
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0220.
Затронутые продукты
Ссылки
- CVE-2022-2849
- SUSE Bug 1202512
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0221.
Затронутые продукты
Ссылки
- CVE-2022-2862
- SUSE Bug 1202511
Описание
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0224.
Затронутые продукты
Ссылки
- CVE-2022-2874
- SUSE Bug 1202552
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0225.
Затронутые продукты
Ссылки
- CVE-2022-2889
- SUSE Bug 1202599
Описание
NULL Pointer Dereference in GitHub repository vim/vim prior to 9.0.0240.
Затронутые продукты
Ссылки
- CVE-2022-2923
- SUSE Bug 1202687
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0246.
Затронутые продукты
Ссылки
- CVE-2022-2946
- SUSE Bug 1202689
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.0286.
Затронутые продукты
Ссылки
- CVE-2022-3016
- SUSE Bug 1202862