Описание
Security update for vim
This update for vim fixes the following issues:
Updated to version 9.0 with patch level 2103, fixes the following security problems
- CVE-2023-5344: vim: Heap-based Buffer Overflow in vim prior to 9.0.1969 (bsc#1215940)
- CVE-2023-5441: vim: segfault in exmode when redrawing (bsc#1216001)
- CVE-2023-5535: vim: use-after-free from buf_contents_changed() (bsc#1216167)
- CVE-2023-46246: vim: Integer Overflow in :history command (bsc#1216696)
- CVE-2023-4738: vim: heap-buffer-overflow in vim_regsub_both (bsc#1214922)
- CVE-2023-4735: vim: OOB Write ops.c (bsc#1214924)
- CVE-2023-4734: vim: segmentation fault in function f_fullcommand (bsc#1214925)
- CVE-2023-4733: vim: use-after-free in function buflist_altfpos (bsc#1215004)
- CVE-2023-4752: vim: Heap Use After Free in function ins_compl_get_exp (bsc#1215006)
- CVE-2023-4781: vim: heap-buffer-overflow in function vim_regsub_both (bsc#1215033)
Список пакетов
Container suse/hpc/warewulf4-x86_64/sle-hpc-node:latest
Container suse/manager/5.0/x86_64/server:latest
Container suse/sle-micro/5.5/toolbox:latest
Container suse/sle-micro/5.5:latest
Container suse/sles/15.6/virt-launcher:1.1.1
Container suse/sles/15.7/virt-launcher:1.4.0
Image SLES15-SP5-Azure-3P
Image SLES15-SP5-Azure-Basic
Image SLES15-SP5-Azure-Standard
Image SLES15-SP5-BYOS-Azure
Image SLES15-SP5-BYOS-EC2
Image SLES15-SP5-BYOS-GCE
Image SLES15-SP5-CHOST-BYOS-Aliyun
Image SLES15-SP5-CHOST-BYOS-Azure
Image SLES15-SP5-CHOST-BYOS-EC2
Image SLES15-SP5-CHOST-BYOS-GCE
Image SLES15-SP5-CHOST-BYOS-GDC
Image SLES15-SP5-CHOST-BYOS-SAP-CCloud
Image SLES15-SP5-EC2
Image SLES15-SP5-GCE
Image SLES15-SP5-HPC-Azure
Image SLES15-SP5-HPC-BYOS-Azure
Image SLES15-SP5-HPC-BYOS-EC2
Image SLES15-SP5-HPC-BYOS-GCE
Image SLES15-SP5-Hardened-BYOS-Azure
Image SLES15-SP5-Hardened-BYOS-EC2
Image SLES15-SP5-Hardened-BYOS-GCE
Image SLES15-SP5-Manager-Proxy-5-0-BYOS
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-Azure
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-EC2
Image SLES15-SP5-Manager-Proxy-5-0-BYOS-GCE
Image SLES15-SP5-Manager-Server-5-0
Image SLES15-SP5-Manager-Server-5-0-Azure-llc
Image SLES15-SP5-Manager-Server-5-0-Azure-ltd
Image SLES15-SP5-Manager-Server-5-0-BYOS
Image SLES15-SP5-Manager-Server-5-0-BYOS-Azure
Image SLES15-SP5-Manager-Server-5-0-BYOS-EC2
Image SLES15-SP5-Manager-Server-5-0-BYOS-GCE
Image SLES15-SP5-Manager-Server-5-0-EC2-llc
Image SLES15-SP5-Manager-Server-5-0-EC2-ltd
Image SLES15-SP5-Micro-5-5
Image SLES15-SP5-Micro-5-5-Azure
Image SLES15-SP5-Micro-5-5-BYOS
Image SLES15-SP5-Micro-5-5-BYOS-Azure
Image SLES15-SP5-Micro-5-5-BYOS-EC2
Image SLES15-SP5-Micro-5-5-BYOS-GCE
Image SLES15-SP5-Micro-5-5-EC2
Image SLES15-SP5-Micro-5-5-GCE
Image SLES15-SP5-SAP-Azure-3P
Image SLES15-SP5-SAP-Azure-LI-BYOS
Image SLES15-SP5-SAP-Azure-LI-BYOS-Production
Image SLES15-SP5-SAP-Azure-VLI-BYOS
Image SLES15-SP5-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP5-SAP-BYOS-Azure
Image SLES15-SP5-SAP-BYOS-EC2
Image SLES15-SP5-SAP-BYOS-GCE
Image SLES15-SP5-SAP-Hardened-Azure
Image SLES15-SP5-SAP-Hardened-BYOS-Azure
Image SLES15-SP5-SAP-Hardened-BYOS-EC2
Image SLES15-SP5-SAP-Hardened-BYOS-GCE
Image SLES15-SP5-SAP-Hardened-GCE
Image SLES15-SP5-SAPCAL-Azure
Image SLES15-SP5-SAPCAL-EC2
Image SLES15-SP5-SAPCAL-GCE
Image SLES15-SP6
Image SLES15-SP6-Azure-Basic
Image SLES15-SP6-Azure-Standard
Image SLES15-SP6-BYOS
Image SLES15-SP6-BYOS-Azure
Image SLES15-SP6-BYOS-EC2
Image SLES15-SP6-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS
Image SLES15-SP6-CHOST-BYOS-Aliyun
Image SLES15-SP6-CHOST-BYOS-Azure
Image SLES15-SP6-CHOST-BYOS-EC2
Image SLES15-SP6-CHOST-BYOS-GCE
Image SLES15-SP6-CHOST-BYOS-GDC
Image SLES15-SP6-CHOST-BYOS-SAP-CCloud
Image SLES15-SP6-EC2
Image SLES15-SP6-EC2-ECS-HVM
Image SLES15-SP6-GCE
Image SLES15-SP6-HPC
Image SLES15-SP6-HPC-Azure
Image SLES15-SP6-HPC-BYOS
Image SLES15-SP6-HPC-BYOS-Azure
Image SLES15-SP6-HPC-BYOS-EC2
Image SLES15-SP6-HPC-BYOS-GCE
Image SLES15-SP6-HPC-EC2
Image SLES15-SP6-HPC-GCE
Image SLES15-SP6-Hardened-BYOS
Image SLES15-SP6-Hardened-BYOS-Azure
Image SLES15-SP6-Hardened-BYOS-EC2
Image SLES15-SP6-Hardened-BYOS-GCE
Image SLES15-SP6-SAP
Image SLES15-SP6-SAP-Azure
Image SLES15-SP6-SAP-Azure-LI-BYOS
Image SLES15-SP6-SAP-Azure-LI-BYOS-Production
Image SLES15-SP6-SAP-Azure-VLI-BYOS
Image SLES15-SP6-SAP-Azure-VLI-BYOS-Production
Image SLES15-SP6-SAP-BYOS
Image SLES15-SP6-SAP-BYOS-Azure
Image SLES15-SP6-SAP-BYOS-EC2
Image SLES15-SP6-SAP-BYOS-GCE
Image SLES15-SP6-SAP-EC2
Image SLES15-SP6-SAP-GCE
Image SLES15-SP6-SAP-Hardened
Image SLES15-SP6-SAP-Hardened-Azure
Image SLES15-SP6-SAP-Hardened-BYOS
Image SLES15-SP6-SAP-Hardened-BYOS-Azure
Image SLES15-SP6-SAP-Hardened-BYOS-EC2
Image SLES15-SP6-SAP-Hardened-BYOS-GCE
Image SLES15-SP6-SAP-Hardened-EC2
Image SLES15-SP6-SAP-Hardened-GCE
Image SLES15-SP6-SAPCAL
Image SLES15-SP6-SAPCAL-Azure
Image SLES15-SP6-SAPCAL-EC2
Image SLES15-SP6-SAPCAL-GCE
Image server-image
SUSE Linux Enterprise Micro 5.5
SUSE Linux Enterprise Module for Basesystem 15 SP5
SUSE Linux Enterprise Module for Desktop Applications 15 SP5
openSUSE Leap 15.5
Ссылки
- Link for SUSE-SU-2023:4557-1
- E-Mail link for SUSE-SU-2023:4557-1
- SUSE Security Ratings
- SUSE Bug 1214922
- SUSE Bug 1214924
- SUSE Bug 1214925
- SUSE Bug 1215004
- SUSE Bug 1215006
- SUSE Bug 1215033
- SUSE Bug 1215940
- SUSE Bug 1216001
- SUSE Bug 1216167
- SUSE Bug 1216696
- SUSE CVE CVE-2023-46246 page
- SUSE CVE CVE-2023-4733 page
- SUSE CVE CVE-2023-4734 page
- SUSE CVE CVE-2023-4735 page
- SUSE CVE CVE-2023-4738 page
- SUSE CVE CVE-2023-4752 page
- SUSE CVE CVE-2023-4781 page
Описание
Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function `ga_grow_inner` in in the file `src/alloc.c` at line 748, which is freed in the file `src/ex_docmd.c` in the function `do_cmdline` at line 1010 and then used again in `src/cmdhist.c` at line 759. When using the `:history` command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
Затронутые продукты
Ссылки
- CVE-2023-46246
- SUSE Bug 1216696
- SUSE Bug 1217023
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.1840.
Затронутые продукты
Ссылки
- CVE-2023-4733
- SUSE Bug 1215004
- SUSE Bug 1217411
- SUSE Bug 1218353
- SUSE Bug 1221583
Описание
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.
Затронутые продукты
Ссылки
- CVE-2023-4734
- SUSE Bug 1214925
Описание
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.
Затронутые продукты
Ссылки
- CVE-2023-4735
- SUSE Bug 1214924
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.
Затронутые продукты
Ссылки
- CVE-2023-4738
- SUSE Bug 1214922
- SUSE Bug 1217411
- SUSE Bug 1218353
- SUSE Bug 1221583
Описание
Use After Free in GitHub repository vim/vim prior to 9.0.1858.
Затронутые продукты
Ссылки
- CVE-2023-4752
- SUSE Bug 1215006
- SUSE Bug 1217411
- SUSE Bug 1218353
- SUSE Bug 1221583
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.
Затронутые продукты
Ссылки
- CVE-2023-4781
- SUSE Bug 1215033
- SUSE Bug 1215457
- SUSE Bug 1217411
- SUSE Bug 1218353
- SUSE Bug 1221583
Описание
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
Затронутые продукты
Ссылки
- CVE-2023-5344
- SUSE Bug 1215940
- SUSE Bug 1217023
Описание
NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
Затронутые продукты
Ссылки
- CVE-2023-5441
- SUSE Bug 1216001
- SUSE Bug 1217023
Описание
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
Затронутые продукты
Ссылки
- CVE-2023-5535
- SUSE Bug 1216167
- SUSE Bug 1217023
- SUSE Bug 1221583