Security update for vim

Announcement ID: SUSE-SU-2022:0736-2
Rating: important
References:
Cross-References:
CVSS scores:
  • CVE-2021-3778 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  • CVE-2021-3778 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-3796 ( SUSE ): 5.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
  • CVE-2021-3796 ( NVD ): 7.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:H
  • CVE-2021-3872 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-3872 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-3927 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
  • CVE-2021-3927 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-3928 ( SUSE ): 6.1 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:L
  • CVE-2021-3928 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2021-3984 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2021-3984 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-4019 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2021-4019 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2021-4193 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2021-4193 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  • CVE-2021-46059 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2022-0318 ( SUSE ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
  • CVE-2022-0318 ( NVD ): 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-0319 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N
  • CVE-2022-0319 ( NVD ): 5.5 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
  • CVE-2022-0351 ( SUSE ): 3.3 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
  • CVE-2022-0351 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • CVE-2022-0361 ( SUSE ): 6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
  • CVE-2022-0361 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2022-0413 ( SUSE ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
  • CVE-2022-0413 ( NVD ): 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Affected Products:
  • SUSE Linux Enterprise Micro 5.2
  • SUSE Linux Enterprise Micro for Rancher 5.2

An update that solves 14 vulnerabilities can now be installed.

Description:

This update for vim fixes the following issues:

  • CVE-2022-0318: Fixed heap-based buffer overflow (bsc#1195004).
  • CVE-2021-3796: Fixed use-after-free in nv_replace() in normal.c (bsc#1190570).
  • CVE-2021-3872: Fixed heap-based buffer overflow in win_redr_status() drawscreen.c (bsc#1191893).
  • CVE-2021-3927: Fixed heap-based buffer overflow (bsc#1192481).
  • CVE-2021-3928: Fixed stack-based buffer overflow (bsc#1192478).
  • CVE-2021-4019: Fixed heap-based buffer overflow (bsc#1193294).
  • CVE-2021-3984: Fixed illegal memory access when C-indenting could have led to heap buffer overflow (bsc#1193298).
  • CVE-2021-3778: Fixed heap-based buffer overflow in regexp_nfa.c (bsc#1190533).
  • CVE-2021-4193: Fixed out-of-bounds read (bsc#1194216).
  • CVE-2021-46059: Fixed pointer dereference vulnerability via the vim_regexec_multi function at regexp.c (bsc#1194556).
  • CVE-2022-0319: Fixded out-of-bounds read (bsc#1195066).
  • CVE-2022-0351: Fixed uncontrolled recursion in eval7() (bsc#1195126).
  • CVE-2022-0361: Fixed buffer overflow (bsc#1195126).
  • CVE-2022-0413: Fixed use-after-free in src/ex_cmds.c (bsc#1195356).

Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  • SUSE Linux Enterprise Micro 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-736=1
  • SUSE Linux Enterprise Micro for Rancher 5.2
    zypper in -t patch SUSE-SUSE-MicroOS-5.2-2022-736=1

Package List:

  • SUSE Linux Enterprise Micro 5.2 (noarch)
    • vim-data-common-8.0.1568-5.17.1
  • SUSE Linux Enterprise Micro 5.2 (aarch64 s390x x86_64)
    • vim-debugsource-8.0.1568-5.17.1
    • vim-debuginfo-8.0.1568-5.17.1
    • vim-small-8.0.1568-5.17.1
    • vim-small-debuginfo-8.0.1568-5.17.1
  • SUSE Linux Enterprise Micro for Rancher 5.2 (noarch)
    • vim-data-common-8.0.1568-5.17.1
  • SUSE Linux Enterprise Micro for Rancher 5.2 (aarch64 s390x x86_64)
    • vim-debugsource-8.0.1568-5.17.1
    • vim-debuginfo-8.0.1568-5.17.1
    • vim-small-8.0.1568-5.17.1
    • vim-small-debuginfo-8.0.1568-5.17.1

References: