Upstream information

CVE-2025-22134 at MITRE

Description

When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003

SUSE information

Overall state of this security issue: Pending

This issue is currently rated as having moderate severity.

CVSS v3 Scores
  CNA (GitHub) SUSE
Base Score 4.2 4.2
Vector CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L
Attack Vector Local Local
Attack Complexity High High
Privileges Required Low Low
User Interaction Required Required
Scope Unchanged Unchanged
Confidentiality Impact Low Low
Integrity Impact Low Low
Availability Impact Low Low
CVSSv3 Version 3.1 3.1
CVSS v4 Scores
  SUSE
Base Score 1
Vector CVSS:4.0/AV:L/AC:H/AT:P/PR:L/UI:A/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
Attack Vector Local
Attack Complexity High
Attack Requirements Present
Privileges Required Low
User Interaction Active
Vulnerable System Confidentiality Impact Low
Vulnerable System Integrity Impact Low
Vulnerable System Availability Impact Low
Subsequent System Confidentiality Impact None
Subsequent System Integrity Impact None
Subsequent System Availability Impact None
CVSSv4 Version 4.0
SUSE Bugzilla entry: 1235695 [NEW]

No SUSE Security Announcements cross referenced.


Status of this issue by product and package

Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.

Product(s) Source package State
Products under general support and receiving all security fixes.
SLES15-SP5-CHOST-BYOS-Aliyun vim Affected
SLES15-SP5-CHOST-BYOS-Azure vim Affected
SLES15-SP5-CHOST-BYOS-EC2 vim Affected
SLES15-SP5-CHOST-BYOS-GCE vim Affected
SLES15-SP5-CHOST-BYOS-SAP-CCloud vim Affected
SLES15-SP6-CHOST-BYOS vim Affected
SLES15-SP6-CHOST-BYOS-Aliyun vim Affected
SLES15-SP6-CHOST-BYOS-Azure vim Affected
SLES15-SP6-CHOST-BYOS-EC2 vim Affected
SLES15-SP6-CHOST-BYOS-GCE vim Affected
SLES15-SP6-CHOST-BYOS-GDC vim Affected
SLES15-SP6-CHOST-BYOS-SAP-CCloud vim Affected
SUSE Linux Enterprise Desktop 15 SP6 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP6 vim Affected
SUSE Linux Enterprise Micro 5.1 vim Affected
SUSE Linux Enterprise Micro 5.2 vim Affected
SUSE Linux Enterprise Micro 5.3 vim Affected
SUSE Linux Enterprise Micro 5.4 vim Affected
SUSE Linux Enterprise Micro 5.5 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP6 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP6 vim Affected
SUSE Linux Enterprise Server 15 SP6 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP6 vim Affected
SUSE Linux Micro 6.0 vim Affected
SUSE Linux Micro 6.1 vim Affected
SUSE Manager Proxy 4.3 vim Affected
SUSE Manager Retail Branch Server 4.3 vim Affected
SUSE Manager Server 4.3 vim Affected
openSUSE Leap 15.6 vim Affected
openSUSE Leap Micro 5.5 vim Affected
Products under Long Term Service Pack support and receiving important and critical security fixes.
SLES15-EC2-CHOST-HVM-BYOS vim Affected
SLES15-SP1-CHOST-BYOS-Azure vim Affected
SLES15-SP1-CHOST-BYOS-EC2 vim Affected
SLES15-SP1-CHOST-BYOS-GCE vim Affected
SLES15-SP2-CHOST-BYOS-Aliyun vim Affected
SLES15-SP2-CHOST-BYOS-Azure vim Affected
SLES15-SP2-CHOST-BYOS-EC2 vim Affected
SLES15-SP2-CHOST-BYOS-GCE vim Affected
SLES15-SP3-CHOST-BYOS-Aliyun vim Affected
SLES15-SP3-CHOST-BYOS-Azure vim Affected
SLES15-SP3-CHOST-BYOS-EC2 vim Affected
SLES15-SP3-CHOST-BYOS-GCE vim Affected
SLES15-SP3-CHOST-BYOS-SAP-CCloud vim Affected
SLES15-SP4-CHOST-BYOS vim Affected
SLES15-SP4-CHOST-BYOS-Aliyun vim Affected
SLES15-SP4-CHOST-BYOS-Azure vim Affected
SLES15-SP4-CHOST-BYOS-EC2 vim Affected
SLES15-SP4-CHOST-BYOS-GCE vim Affected
SLES15-SP4-CHOST-BYOS-SAP-CCloud vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP3 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP4 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP5 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP3 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP4 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP5 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP3 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP4 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP5 vim Affected
SUSE Linux Enterprise Server 12 SP5 vim Affected
SUSE Linux Enterprise Server 12 SP5-LTSS vim Affected
SUSE Linux Enterprise Server 15 SP3 vim Affected
SUSE Linux Enterprise Server 15 SP3-LTSS vim Affected
SUSE Linux Enterprise Server 15 SP4 vim Affected
SUSE Linux Enterprise Server 15 SP4-LTSS vim Affected
SUSE Linux Enterprise Server 15 SP5 vim Affected
SUSE Linux Enterprise Server 15 SP5-LTSS vim Affected
SUSE Linux Enterprise Server LTSS Extended Security 12 SP5 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP3 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP4 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP5 vim Affected
Products past their end of life and not receiving proactive updates anymore.
HPE Helion OpenStack 8 vim Affected
SUSE CaaS Platform 3.0 vim Affected
SUSE CaaS Platform 4.0 vim Affected
SUSE Enterprise Storage 6 vim Affected
SUSE Enterprise Storage 7 vim Affected
SUSE Enterprise Storage 7.1 vim Affected
SUSE Linux Enterprise Desktop 11 SP2 vim Affected
SUSE Linux Enterprise Desktop 11 SP3 vim Affected
SUSE Linux Enterprise Desktop 11 SP4 vim Affected
SUSE Linux Enterprise Desktop 12 vim Affected
SUSE Linux Enterprise Desktop 12 SP1 vim Affected
SUSE Linux Enterprise Desktop 12 SP2 vim Affected
SUSE Linux Enterprise Desktop 12 SP3 vim Affected
SUSE Linux Enterprise Desktop 12 SP4 vim Affected
SUSE Linux Enterprise Desktop 15 vim Affected
SUSE Linux Enterprise Desktop 15 SP1 vim Affected
SUSE Linux Enterprise Desktop 15 SP2 vim Affected
SUSE Linux Enterprise Desktop 15 SP3 vim Affected
SUSE Linux Enterprise Desktop 15 SP4 vim Affected
SUSE Linux Enterprise Desktop 15 SP5 vim Affected
SUSE Linux Enterprise High Performance Computing 15 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP1 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP1-LTSS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP2 vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP2-LTSS vim Affected
SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15-ESPOS vim Affected
SUSE Linux Enterprise High Performance Computing 15-LTSS vim Affected
SUSE Linux Enterprise Micro 5.0 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP1 vim Affected
SUSE Linux Enterprise Module for Basesystem 15 SP2 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP1 vim Affected
SUSE Linux Enterprise Module for Desktop Applications 15 SP2 vim Affected
SUSE Linux Enterprise Point of Sale 11 SP3 vim Affected
SUSE Linux Enterprise Point of Sale 12 SP2-CLIENT vim Affected
SUSE Linux Enterprise Real Time 15 SP2 vim Affected
SUSE Linux Enterprise Real Time 15 SP3 vim Affected
SUSE Linux Enterprise Real Time 15 SP4 vim Affected
SUSE Linux Enterprise Server 11 SP2 vim Affected
SUSE Linux Enterprise Server 11 SP2-LTSS vim Affected
SUSE Linux Enterprise Server 11 SP3 vim Affected
SUSE Linux Enterprise Server 11 SP3-LTSS vim Affected
SUSE Linux Enterprise Server 11 SP4 vim Affected
SUSE Linux Enterprise Server 11 SP4 LTSS vim Affected
SUSE Linux Enterprise Server 11 SP4-LTSS vim Affected
SUSE Linux Enterprise Server 12 vim Affected
SUSE Linux Enterprise Server 12 SP1 vim Affected
SUSE Linux Enterprise Server 12 SP1-LTSS vim Affected
SUSE Linux Enterprise Server 12 SP2 vim Affected
SUSE Linux Enterprise Server 12 SP2-BCL vim Affected
SUSE Linux Enterprise Server 12 SP2-ESPOS vim Affected
SUSE Linux Enterprise Server 12 SP2-LTSS vim Affected
SUSE Linux Enterprise Server 12 SP3 vim Affected
SUSE Linux Enterprise Server 12 SP3-BCL vim Affected
SUSE Linux Enterprise Server 12 SP3-ESPOS vim Affected
SUSE Linux Enterprise Server 12 SP3-LTSS vim Affected
SUSE Linux Enterprise Server 12 SP4 vim Affected
SUSE Linux Enterprise Server 12 SP4-ESPOS vim Affected
SUSE Linux Enterprise Server 12 SP4-LTSS vim Affected
SUSE Linux Enterprise Server 12-LTSS vim Affected
SUSE Linux Enterprise Server 15 vim Affected
SUSE Linux Enterprise Server 15 SP1 vim Affected
SUSE Linux Enterprise Server 15 SP1-BCL vim Affected
SUSE Linux Enterprise Server 15 SP1-LTSS vim Affected
SUSE Linux Enterprise Server 15 SP2 vim Affected
SUSE Linux Enterprise Server 15 SP2-BCL vim Affected
SUSE Linux Enterprise Server 15 SP2-LTSS vim Affected
SUSE Linux Enterprise Server 15 SP3-BCL vim Affected
SUSE Linux Enterprise Server 15-LTSS vim Affected
SUSE Linux Enterprise Server for Raspberry Pi 12 SP2 vim Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP1 vim Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP2 vim Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP3 vim Affected
SUSE Linux Enterprise Server for SAP Applications 12 SP4 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP1 vim Affected
SUSE Linux Enterprise Server for SAP Applications 15 SP2 vim Affected
SUSE Manager Proxy 4.0 vim Affected
SUSE Manager Proxy 4.1 vim Affected
SUSE Manager Proxy 4.2 vim Affected
SUSE Manager Retail Branch Server 4.0 vim Affected
SUSE Manager Retail Branch Server 4.1 vim Affected
SUSE Manager Retail Branch Server 4.2 vim Affected
SUSE Manager Server 4.0 vim Affected
SUSE Manager Server 4.1 vim Affected
SUSE Manager Server 4.2 vim Affected
SUSE OpenStack Cloud 7 vim Affected
SUSE OpenStack Cloud 8 vim Affected
SUSE OpenStack Cloud 9 vim Affected
SUSE OpenStack Cloud Crowbar 8 vim Affected
SUSE OpenStack Cloud Crowbar 9 vim Affected
openSUSE Leap 15.3 vim Affected
openSUSE Leap 15.4 vim Affected
openSUSE Leap 15.5 vim Affected
openSUSE Leap Micro 5.2 vim Affected
openSUSE Leap Micro 5.3 vim Affected
openSUSE Leap Micro 5.4 vim Affected
Products at an unknown state of their lifecycle.
SLES15-SP5-CHOST-BYOS-GDC vim Affected
SUSE Linux Micro Extras 6.0 vim Affected
Container Status
bci/dotnet-aspnet:5.0
bci/dotnet-runtime:5.0
bci/dotnet-sdk:5.0
ses/7.1/ceph/haproxy
suse/manager/5.0/x86_64/server
suse/sle-micro/5.0/toolbox
suse/sle-micro/5.1/toolbox
suse/sle-micro/5.2/toolbox
suse/sle-micro/5.3/toolbox
suse/sle-micro/5.4/toolbox
suse/sle-micro/5.5/toolbox
suse/sles/15.2/virt-launcher:0.38.1
suse/sles/15.3/virt-launcher:0.45.0
suse/sles/15.4/virt-launcher:0.49.0
vimAffected


SUSE Timeline for this CVE

CVE page created: Sat Jan 11 16:00:08 2025
CVE page last modified: Wed Jan 15 01:04:19 2025