Security update for vim
Announcement ID: | SUSE-SU-2023:0209-1 |
---|---|
Rating: | important |
References: | |
Cross-References: | |
CVSS scores: |
|
Affected Products: |
|
An update that solves 12 vulnerabilities can now be installed.
Description:
This update for vim fixes the following issues:
- Updated to version 9.0.1234:
- CVE-2023-0433: Fixed an out of bounds memory access that could cause a crash (bsc#1207396).
- CVE-2023-0288: Fixed an out of bounds memory access that could cause a crash (bsc#1207162).
- CVE-2023-0054: Fixed an out of bounds memory write that could cause a crash or memory corruption (bsc#1206868).
- CVE-2023-0051: Fixed an out of bounds memory access that could cause a crash (bsc#1206867).
- CVE-2023-0049: Fixed an out of bounds memory access that could cause a crash (bsc#1206866).
- CVE-2022-3491: Fixed an out of bounds memory access that could cause a crash (bsc#1206028).
- CVE-2022-3520: Fixed an out of bounds memory access that could cause a crash (bsc#1206071).
- CVE-2022-3591: Fixed a use-after-free issue that could cause memory corruption or undefined behavior (bsc#1206072).
- CVE-2022-4292: Fixed a use-after-free issue that could cause memory corruption or undefined behavior (bsc#1206075).
- CVE-2022-4293: Fixed a floating point exception that could cause a crash (bsc#1206077).
- CVE-2022-4141: Fixed an out of bounds memory write that could cause a crash or memory corruption (bsc#1205797).
- CVE-2022-3705: Fixed an use-after-free issue that could cause a crash or memory corruption (bsc#1204779).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE OpenStack Cloud 9
zypper in -t patch SUSE-OpenStack-Cloud-9-2023-209=1
-
SUSE OpenStack Cloud Crowbar 9
zypper in -t patch SUSE-OpenStack-Cloud-Crowbar-9-2023-209=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4
zypper in -t patch SUSE-SLE-SAP-12-SP4-2023-209=1
-
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2
zypper in -t patch SUSE-SLE-SERVER-12-SP2-BCL-2023-209=1
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-ESPOS-2023-209=1
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4
zypper in -t patch SUSE-SLE-SERVER-12-SP4-LTSS-2023-209=1
-
SUSE Linux Enterprise High Performance Computing 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-209=1
-
SUSE Linux Enterprise Server 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-209=1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5
zypper in -t patch SUSE-SLE-SERVER-12-SP5-2023-209=1
Package List:
-
SUSE OpenStack Cloud 9 (x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE OpenStack Cloud 9 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE OpenStack Cloud Crowbar 9 (x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE OpenStack Cloud Crowbar 9 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (ppc64le x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP4 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP2 BCL 12-SP2 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (aarch64 x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP4 ESPOS 12-SP4 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (aarch64 ppc64le s390x x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP4 LTSS 12-SP4 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (aarch64 x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise High Performance Computing 12 SP5 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP5 (aarch64 ppc64le s390x x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server 12 SP5 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (ppc64le x86_64)
- gvim-9.0.1234-17.12.1
- vim-debuginfo-9.0.1234-17.12.1
- vim-debugsource-9.0.1234-17.12.1
- vim-9.0.1234-17.12.1
- gvim-debuginfo-9.0.1234-17.12.1
-
SUSE Linux Enterprise Server for SAP Applications 12 SP5 (noarch)
- vim-data-common-9.0.1234-17.12.1
- vim-data-9.0.1234-17.12.1
References:
- https://www.suse.com/security/cve/CVE-2022-3491.html
- https://www.suse.com/security/cve/CVE-2022-3520.html
- https://www.suse.com/security/cve/CVE-2022-3591.html
- https://www.suse.com/security/cve/CVE-2022-3705.html
- https://www.suse.com/security/cve/CVE-2022-4141.html
- https://www.suse.com/security/cve/CVE-2022-4292.html
- https://www.suse.com/security/cve/CVE-2022-4293.html
- https://www.suse.com/security/cve/CVE-2023-0049.html
- https://www.suse.com/security/cve/CVE-2023-0051.html
- https://www.suse.com/security/cve/CVE-2023-0054.html
- https://www.suse.com/security/cve/CVE-2023-0288.html
- https://www.suse.com/security/cve/CVE-2023-0433.html
- https://bugzilla.suse.com/show_bug.cgi?id=1204779
- https://bugzilla.suse.com/show_bug.cgi?id=1205797
- https://bugzilla.suse.com/show_bug.cgi?id=1206028
- https://bugzilla.suse.com/show_bug.cgi?id=1206071
- https://bugzilla.suse.com/show_bug.cgi?id=1206072
- https://bugzilla.suse.com/show_bug.cgi?id=1206075
- https://bugzilla.suse.com/show_bug.cgi?id=1206077
- https://bugzilla.suse.com/show_bug.cgi?id=1206866
- https://bugzilla.suse.com/show_bug.cgi?id=1206867
- https://bugzilla.suse.com/show_bug.cgi?id=1206868
- https://bugzilla.suse.com/show_bug.cgi?id=1207162
- https://bugzilla.suse.com/show_bug.cgi?id=1207396